Uncategorized SQL Injection: What it Really Means and How You Can avoid it What is SQL injection? First, let's understand what an injection attack is before we delve…Brandon GatesApril 30, 2019
Uncategorized Password Security Attacks: Let Us Teach You How to Prevent Them Consider the following : You are creating a new account, it could be a financial…Brandon GatesApril 26, 2019
Uncategorized Network Breaches at Banks – How They Happen and How to Stop Them A network breach occurs when a cyber-attacker successfully infiltrates a network system to access data…Brandon GatesApril 21, 2019
Uncategorized Two serious network security risks we tend to overlook While we concentrate on protecting our computers against warms, virus, Adware, and spyware, we tend…Brandon GatesApril 15, 2019
Uncategorized Beware of these common internet scams Internet scams have been in existence since the beginning of information technology. Internet scams have…Brandon GatesApril 12, 2019
Uncategorized Common Network security threats “Stranger Danger” is a common childhood warning phrase which uses to keep us safe from…Brandon GatesApril 8, 2019
Uncategorized Panera Bread Data Breach A successful Security breach happens when an unwanted or unauthorized person accesses a company's database…Brandon GatesMarch 23, 2019
tech Equifax data breach Equifax Data Breach Introduction In September 2017, Equifax was found to be a…Brandon GatesMarch 16, 2019
Uncategorized The rise of artificial intelligence Artificial intelligence (AI) is a computer science discipline that aims at developing computer systems that…Brandon GatesMarch 8, 2019
Uncategorized Security Breach in Public Wifi Public wi-fi are made available in public places such as malls, coffee shops, restaurants, hotels,…Brandon GatesMarch 1, 2019
tech Cybersecurity Mandates Cybersecurity Laws In the past, cybersecurity attacks involved credit card scammers and corporate hacks. Today,…Brandon GatesFebruary 24, 2019
tech Penetration Testing Penetration Testing Introduction Pen testing is in an authorized cyber-attack in a simulated environment on…Brandon GatesFebruary 20, 2019
tech Facebook Data Breach Compromises 50 Million Accounts Facebook Data Breach Compromises 50 Million Accounts Facebook has in the recent past been…Brandon GatesFebruary 15, 2019
tech Current news and how it affects cybersecurity in the future Current news and how it affects cybersecurity in the future Recent cyber security news Recent…Brandon GatesFebruary 4, 2019
tech Myths and Realities of Cybersecurity Myths and Realities of Cybersecurity One fact that seems to be bothering all those in…Brandon GatesJanuary 26, 2019
tech Why Gaps Exist and the Need for Cybersecurity Trained Specialists Why Gaps Exist and the Need for Cybersecurity Trained Specialists New studies point to the…Brandon GatesJanuary 21, 2019
tech What Cyber Security is and Why it is Vital in the Digital Age “What Cyber Security is and Why it is Vital in the Digital Age” Over the…Brandon GatesJanuary 11, 2019
tech Cyber Security and Certification Careers in IT are the most interesting. It is a domain marred by rapid and…Brandon GatesDecember 22, 2018