Spear Phishing: How It Happens & Why You May Be at Risk

When phishing gets hyper-focused, it becomes more convincing. Learn how to spot a spear phishing attack before you “click here.” No matter what technology is available, deception is a critical…
The post Spear Phishing: How It Happens & Why You M… Continue reading Spear Phishing: How It Happens & Why You May Be at Risk

The Role of Access Control in Information Security

Access control systems are everywhere and play a key role in identity and access management (IAM)— let’s break down the different types of access control models & how they work…
The post The Role of Access Control in Information Security appeare… Continue reading The Role of Access Control in Information Security

What Is a Firewall? Definition, Types & Business Uses

95% of Firemon survey respondents say firewalls are “as critical or more critical than ever” — let’s explore what firewalls are, how they work, and how they help to keep…
The post What Is a Firewall? Definition, Types & Business Uses appeared fi… Continue reading What Is a Firewall? Definition, Types & Business Uses

What Is Smishing? Definition, Examples & Protection Tips

While SMS phishing text scams are nothing new, they’re a type of threat that’s gaining traction with cybercriminals. Proofpoint reports that 84% of organizations faced smishing attacks in 2019 alone……
The post What Is Smishing? Definition, Examples … Continue reading What Is Smishing? Definition, Examples & Protection Tips

Teen Hackers & Cybercrime: Teen Rebellion Ain’t What It Used to Be

From cryptocurrency schemes to shutting down schools — some of the biggest cybercrimes in 2020 and in recent years have been pulled off by individuals who weren’t old enough to…
The post Teen Hackers & Cybercrime: Teen Rebellion Ain’t What It Us… Continue reading Teen Hackers & Cybercrime: Teen Rebellion Ain’t What It Used to Be

Recent Ransomware Attacks: Latest Ransomware Attack News in 2020

We’ll cover 15 of the most recent ransomware attacks (so far) in 2020 — what they were and who they impacted — as well as some of the latest news…
The post Recent Ransomware Attacks: Latest Ransomware Attack News in 2020 appeared first on Hashed Out… Continue reading Recent Ransomware Attacks: Latest Ransomware Attack News in 2020

What Is a Certificate Authority (CA) and What Do They Do?

Every time you visit a website that starts with HTTPS, you’re using a certificate authority. But what exactly is a CA and how does it make your transactions and communications more secure? Let’s hash it out.
The post What Is a Certificate Author… Continue reading What Is a Certificate Authority (CA) and What Do They Do?