Last updated September 27, 2022 Summary: Credential sharing is when you use someone else’s identity to access a product or platform—like using a friend or family member’s login information to use...
Internet of Things Posts
The IoT is Really the Internet of Endpoints
Last updated September 27, 2022 Summary: IoT devices make life more convenient, but constant connection to a network also makes you more vulnerable to potential cyberattacks.An endpoint is any...
Why is WiFi 6’s Uptake so Slow? A Look at the Current Technological Environment
Last updated August 19, 2022 Summary: Many organizations have been slow to adopt WiFi 6—due to the upgrade costs, a limited number of clients, and a fear of the bugs and issues early adopters of new...
Everything You Need to Know About WiFi 802.11ax (AKA WiFi 6)
Last updated August 19, 2022 Summary: Since 2020, the FCC has expanded access for unlicensed traffic to the broadband spectrum. This access to better, faster WiFi is called WiFi 802.11ax or “WiFi...
Making Sense of TTPs, Cybersecurity, & What That Means for Your Business
Last updated August 19, 2022 Summary: TTPs are tactics, tools, & procedures that threat actors to orchestrate cyber attacks.Analyzing TTPs helps organizations identify who is responsible for...
Is it Possible to Still Browse Anonymously?
Last updated August 19, 2022 Summary: Many internet users use the terms “privacy” and “anonymity” interchangeably, but these are not the same. While steps can be taken to make your internet activity...
How Fear Motivates People to Click on Spam
Last updated September 27, 2022 Summary: Fear is a powerful motivator—and spam, which make up over 85% of all email, takes advantage of this fear to scam people or invade their privacy via...
Operational Technology vs. Information Technology: Differences, Similarities, & How They Intermix With Industrial Control Systems
Last updated August 18, 2022 Summary: Operational Technology (OT) controls the physical functions for organizations, while Information Technology (IT) controls their data. IT can be used to make OT...
Latest Posts
Cybersecurity & the Legal Industry: What You Need to Know (& Protect)
Technology has become a fact of life in the business world, and the legal industry is no exception. Here’s what you need to know about legal cybersecurity.
Cyber Warfare: How the Rules of Conduct Are Changing
Safeguarding your organization’s digital assets used to feel simple. However, with the internet now crucial to many business functions, it’s become a necessity.
Social Engineering 101 (& How to Protect Your Data)
How vulnerable are you and your organization to social engineering attacks? The answer might surprise you. Let the experienced cybersecurity professionals at VirtualArmour give you an overview of how modern social engineering works and show you steps you can take to protect yourself from its potentially disastrous effects.