This form logs you into your management portal account. To access your help desk account, click here and use the form to the right of the news.
There is no such thing as a good user-data leak, but the way a company responds when their network security is breached can set the tone for the public perception of the incident.
Security breaches are a constant risk, but even non-technical consumers can tell the difference between a...
I dislike starting an article with a litany of incidents in which the IT industry has failed its users, but here’s a taste: Equifax, 143 million people;...
Last month, CCleaner, a popular “computer-cleaning” application, was revealed to harbor dangerous malware. Criminals had targeted the distribution channels of the app...
Certificate Authorities issue certificates that verify the identity of the entity behind a site or application. CAs play a vital role in online security and privacy, but the Certificate Authority system isn’t perfect.
Before certificates are issued, the Certificate Authority checks that...
On July 13, Steadfast’s will host Ransomware - End of the World - or a Non-Issue?, an interactive discussion in which Ed Dryer, Senior Technology Strategist at Steadfast, will join a panel...
Modern web applications can be enormously complex on the backend, comprising many different services including caching, databases, queue management, load balancers, proxy servers, and analytics tools. A...
According to a recent report from IBM’s security team, 2016 was not a great year for security and privacy. IBM drew its conclusions from observations gathered from over 8,000 clients and numerous spam sensors and honeypots....
Mirai DDoS botnets have been responsible for several large Distributed Denial of Service attacks over the last few months, the most prominent of which caused availability issues for some of the internet’s biggest companies when the...
Let’s face it, securing your data isn’t as simple as downloading antivirus software anymore. To be frank, it hasn’t been for a while now. Cybercriminals are always searching for ways to undermine your first lines of defense, and if you’re not careful, you could be just one mis-click away from a...
When a diligent system administrator gets their hands on a new server, their work is just beginning. Take a fresh Linux box, put it on the internet, and see how long it is before bots start probing for vulnerabilities. The internet is an unfriendly environment. Before a server is ready to be...