There's no denying it, your organization does amazing work everyday helping patients to meet their healthcare needs. The ability to help your patients is…
9 Ways to Make Your Online Accounts More Secure
Your personal information is woven into the internet. You have bit and pieces of your story hiding in the pages of Facebook, and your…
What Computer Security Experts Wish You Knew: The Top Experts Speak
When it comes to keeping our information secure, many of us seem to be at a loss. With technology rapidly changing like it does,…
How to Protect Your Company From Botnet Attacks
As you plan your defenses against botnet attacks on your organization’s computers and mobile devices, don’t forget to protect your IoT devices as well.
Internal Security Industry Spotlight: Financial Sector
It’s no secret why the financial industry is such a threat target. As criminal Willie Sutton said when asked why he robbed banks: ‘Because…
Hacking Sent Emails? Yes It’s Possible Now!
We used to think of emails like a letter, in the sense that once sent they could not be altered without serious and usually…
New and Dangerous Malware Exploit in Microsoft Office
Just when you thought you were safe, it seems cyber criminals are taking advantage of a vulnerability in Microsoft Powerpoint’s Object Linking Embedding (OLE)…
New Hotel WiFi Malware
Shadow Brokers, the group behind WannaCry, has indirectly transferred the leaked NSA exploit, EternalBlue, to another group of hackers.
Information Security Trends in 2018
The computer security world is constantly changing. Everywhere you look, you can see trending new headlines and statements about the latest data breach at…
Social Media and Cyber Security: Risks from the Digital Social Sphere
Imagine this common scenario, an employee named John posts some politically charged content on his Twitter account and attracts the attention of many people…
Read These 8 Trending July Blog Posts
The purpose of IT Security Central is to be an informative community curating leading industry articles on information security. We believe building awareness of…
Two-Factor Bypass: Real Time Phishing and How to Protect Your Company
No way someone could steal your credentials right? Just to sign in to work you have to enter a password and a PIN. No…