PCI for SMB: Requirement 3 & 4 – Secure Cardholder Data

This is the third post in a series of articles on understanding the Payment Card Industry Data Security Standard – PCI DSS. We want to show how PCI DSS affects small, medium, and large businesses that are going through the compliance process usi… Continue reading PCI for SMB: Requirement 3 & 4 – Secure Cardholder Data

Steps to Keep Your Site Clean: Updates

This is the second post of a series about Steps to Keep Your Site Clean. In the first post, we talked about Access Points; here we are going to offer more insight on Updates.
Updates
Repeatedly we see websites being infected or reinfected when im… Continue reading Steps to Keep Your Site Clean: Updates

Symantec Internet Security Threat Report 2018: The Top Takeaways

It has been a very interesting past year with a few surprises along the way, but as expected cyber-crime grew significantly; financial impact was huge and many companies struggled to recover from cyber-attacks. Cyber security—or the lack of it&#8… Continue reading Symantec Internet Security Threat Report 2018: The Top Takeaways

Content Security Policy

As a website owner, it’s a good idea to be aware of the security issues that might affect your site. For example, Cross-site Scripting (XSS) attacks consist of injecting malicious client-side scripts into a website and using the website as a pro… Continue reading Content Security Policy

Key takeaways from the 2018 Verizon Data Breach Investigations Report

The latest installment of the Verizon Data Breach Investigations Report 2018 is now available. It’s the 11th edition of the report, and not surprisingly, it reveals that hackers have continued to be very successful at using their hacking techniqu… Continue reading Key takeaways from the 2018 Verizon Data Breach Investigations Report

Ever Run a Relay? Why SMB Relays Should Be On Your Mind

Time is never on your side when you’re onsite with a client and trying to get the first good foothold, with admin privileges, can seem impossible.  However, some things seem to work more often than others. One of my current, favorite methods… Continue reading Ever Run a Relay? Why SMB Relays Should Be On Your Mind

10 Best Practices for Data Security in a GDPR World

Rapid technology advances have brought new challenges for the protection of personal data, so every organization needs a comprehensive approach to privacy management. They must also document how they collect, process and store personal data. But too m… Continue reading 10 Best Practices for Data Security in a GDPR World

Webinar: How to Kill Browser Tabs and Tickets Using PowerShell

Have you ever wanted to increase the automation of your IT processes, and kill some of the repetitive browser tabs that you keep open to use every day? It might not be as difficult as you think. JumpCloud® Senior Success Engineer, Scott Reed, rece… Continue reading Webinar: How to Kill Browser Tabs and Tickets Using PowerShell

The Essential List of 3D Printer Accessories

You’ve acquired your first 3D printer and are giddy with excitement. But like all new additive manufacturing adventurers, the more you do with your printer the more questions arise. Don’t worry, we’ve got your back.

Getting the most out of your time with a new 3D printer has a lot to do with the tools and accessories on hand and what you do with them. Let’s take a look at a few of the accessories that should accompany every 3D printer, be it in your home, school, or hackerspace. There’s already enough potential aggravation when it comes to 3D printing, …read more

Continue reading The Essential List of 3D Printer Accessories

What is Virtual Hardening?

If you want to make your website security more robust, you need to think about hardening. To harden your website means to add different layers of protection to reduce the potential attack surface. Hardening often involves manual measures of adding cod… Continue reading What is Virtual Hardening?