CALL US 1800-399-2000

Uzado's Blog

The Latest Cybersecurity News and Advice... All Available Here!


Would You Still Use Uber After Hearing This?

By Alix Postan August 22, 2017

Uber recently agreed to 20 years of audits, as a settlement over a data breach. Would you continue..

Biometrics: To Use or Not to Use?!

By Alix Postan August 18, 2017

According to a Scalar Security Study Report, 81% of respondents admit that cyberattacks are..

Docs.com is facing early retirement

By Alix Postan August 16, 2017

Docs.com is an information sharing Microsoft platform, that houses documents for anyone to see...

Is Data Safe in the Cloud?

By Alix Postan August 7, 2017

When you save something to the cloud, do you give it a second thought? Or do you just forget about..

White House Officials Duped by Phishing Attack

By Maria Catricala August 4, 2017

It’s been recently reported that several White House Officials were tricked into responding, and..

Is Cash Becoming Worthless? Or is Cashless Becoming Priceless?

By Alix Postan July 28, 2017

July 2017 marks the month where debit card transactions have inevitably surpassed cash payments,..

There’s an (HIPAA Compliant) App for That

By Alix Postan July 26, 2017

HIPAA compliance remains to be the most difficult compliance standard to follow, with the highest..

Ashley Madison Pays Up

By Alix Postan July 21, 2017

 

The infamous infidelity website has finally settled on a deal of $11.2 million. Ashley Madison..

The Hulk of Encryption Machines

By Alix Postan July 19, 2017

The ‘Hulk’ of encryption machines is finally here! The IBM Z Mainframe can encrypt approximately..

What Millennials Need to Know About Cybersecurity

By Alix Postan July 12, 2017

#1 – It’s “Cybersecurity” not “cyber security”. Just like cyberattack, cybercafé, cyberbullying,..

5 Steps to Basic Vulnerability and Remediation Management

By Alix Postan July 5, 2017

Vulnerability and Remediation Management can easily become overwhelming when you see such an..

Your computer could be in danger of another ransomware attack

By Alix Postan June 30, 2017

This specific ransomware is called: Petrwrap.

Ransomware is a malicious software that either..

Search

Subscribe to Blog