Author Archives: Amanda Young
- Home
- Articles Posted by Amanda Young (Page 9)
Protecting yourself against poison attacks
Data poisoning by way of logic corruption, data manipulation and data injection happen when the attacker finds a way to access your data set. The kind of poison attack varies depending on the level of access the attacker is able to achieve Here’s what you can do to ensure such access is prevented.
DR Testing
PLAN TESTING & MAINTENANCE While efforts will be made initially to construct this DR Plan is as complete and accurate a manner as possible, it is essentially impossible to address all possible problems at any one time. Additionally, over time the Disaster Recovery needs of the organiza
Poison Attacks: A quick overview
Smart technology is everywhere. Not just in our offices, but even in our day-to-day lives with tools like Google Home and Alexa becoming commonplace. With technology becoming smarter every minute, the risks are increasing by the minute as well. Cybercriminals are finding new ways to corrupt our IT n
Employee Training and Cybersecurity
Studies show that 91% of cybersecurity incidents result from human error. Employee training will form a big part of the cybersecurity initiative that you will take on as an organization. You need to train your employees to identify and respond correctly to cyberthreats. Here are some employee traini
Strengthening your cybersecurity policies
Formulating strong IT policies and laying down the best practices for your staff to follow is one of the best ways to prevent your business from becoming a victim of cybercrime. In this blog, we explore the various areas your IT policy should ideally cover. Passwords Rules regarding password set
Accelerating Excellence: Tobin Solutions’ Path of Continuous Improvement
Hey there! At Tobin Solutions, we're all about making your tech experience top-notch. That's why we offer 24/7 Direct-to-Tech Support—we're here for you whenever you need us, guaranteeing a better technology experience. But hey, we're not ones to rest on our laurels. We're always looking for ways
Why do you need a top-down approach to IT security?
For any organization, its employees are its biggest assets. But, what happens when your biggest assets turn out to be your greatest threats or liabilities? That is how cybercrime can change the game. In a recent study, it came to light that employee actions account for about 70% of the data breache
Your business runs on data, but so do the cyber criminals
One very painful truth about running a business is that you possess data that is attractive to criminals. There is no avoiding that reality. You have data. They want data. It is an ongoing challenge to maintain data security as cyber criminals' efforts evolve and change on a daily basis. The wall