Month: August 2022

What is a phishing attack and how can you protect your employees from them?

An explanation of phishing attacks and how to spot them.

Continue Reading
How to protect your employees from data breaches (and what to do if you're the victim of one)

How to protect your employees from data breaches (and what to do if you’re the victim of one)

What to do in the event of a data breach and how to create a strong password.

Continue Reading

An Intro to Confidential Computing

Confidential computing is an emerging industry initiative and a form of technology that’s capable of isolating and encrypting data in use — or, data that’s in a processing phase within a central processing unit (CPU).

Continue Reading