CyberLog

Informative articles on Cybersecurity, IT Services, and cyber threats as they relate to small and medium size companies.

Matthew Connor

How Dark Web Monitoring Services Work: A Detailed Overview 2024

Dark web monitoring services can help you protect sensitive personal data from being abused.

Data...

Read more
Matthew Connor

What Helps Protect from Spear Phishing?

Around 3.4 billion spear phishing emails are sent every day. 

From this huge number, 47% of emails...

Read more
Matthew Connor

What Is A Tailgating Attack? Its Examples and Prevention

Given the surge in cybercrimes, the need for proactive measures against phishing attacks and...

Read more
Matthew Connor

What Is an IT Audit? A Definitive Guide to Safeguard Your Data

Businesses, especially those with a growing technology infrastructure, can benefit immensely from...

Read more
Matthew Connor

6 Ways to Achieve Complete NIST Compliance

Compliance with the National Institute of Standards and Technology (NIST) framework stands as a...

Read more
Matthew Connor

What Does Hybrid Remote Mean?

The COVID pandemic had a massive impact on us as a civilization, with the workplace going through...

Read more
Matthew Connor

How Can You Protect Yourself from Social Engineering Cyber Awareness: 2023 Strategies

You’d hardly find any confidential data and sensitive information in physical form anymore. The...

Read more
Matthew Connor

How To Protect Your Business From PayPal Invoice Scams

Photo byClint Patterson onUnsplash

It’s not just big businesses that need to worry about fraud...

Read more
Matthew Connor

Cybercrime Prevention: Who Are The Most Likely Victims of Cybercriminal Activity?

The digital landscape is a playground for a myriad of unlawful actions such as identity theft,...

Read more