Enabling two-factor authentication is one of the most effective ways of keeping your accounts secure from password leaks and other attacks. Howeve[...]
According to the ISO/IEC 27001 standard, Cybersecurity Governance is the system by which “an organization specifies the accountability framework[...]
Each year, cyber threats become more sophisticated and complex, and they target individuals and businesses of all kinds. Some of the most common c[...]
Join us for a Panel Discussion with Industry Experts Are Remote Workers a Security risk? Sign up for our LIVE WEBINAR and hear from industry exper[...]
Work from Home Security--Is Your VPN Letting the Hackers In? In the haste of the rapid changes coming down from government agencies, everyone who[...]
Why CompTIA Security Trustmark+™? Last year, Right Hand Inc began embarking on the path of becoming CompTIA Security Trustmark+ certifi[...]
Right Hand Technology Group: Pittsburgh’s Premier Managed IT Service Provider Earns CompTIA Security Trustmark+™ Industry Recognition for Excelle[...]
7 Tactics to Get Employees Invested in Spotting Email Scams Would your employee tell you if they clicked a weird link? Would they even recognize the [...]
Can You Spot These Phishing Scams? Would you or your employees recognize these clever phishing scams? It only takes a click to compromise data. Find [...]
An IBM Security study found that 60 percent of respondents opposed local governments paying ransomware. Read on to learn more about the implications. [...]