Author Archives: Kie Liang

OAuth Phishing Attacks: Threat Advisory

What You Need To Know About OAuth Phishing Attacks Amnesty International has reported that OAuth Phishing attacks targeted dozens of Egyptian human rights defenders since the beginning of this year. They are warning that these human rights defenders should be vigilant and contact them if they receive any suspicious emails. “Since January 2019 several human […]

What Is Network Segmentation?

What Is Network Segmentation? Businesses that offer WiFi to their customers or have sensitive data needs should consider network segmentation as a necessary component of their IT solution. With network segmentation, your wireless services are separated into different parts, allowing you to better control access and data flow. Network segmentation splits your wireless services into […]

Online Free Excel Training: Tips & Techniques For Managing Workbooks

Organization Shouldn’t Be Complicated Out of all of Microsoft’s Office programs, Excel is one of the most universally used. What started out as a fairly basic spreadsheet program has evolved into a must-have business tool. However, the more you use Excel, the more data your workbooks will accumulate. Keeping these workbooks organized and easy to […]

Top Ways to Avoid Phishing Scams (Including Spear Phishing)

Phishing scams — and, increasingly, spear-phishing scams — are the number one way that cyber hackers gain access to closed computer systems, steal information and money, and corrupt data. Let’s take a look at what phishing and spear-phishing scams really are, how you can spot them, and how to help your organization avoid their highly […]

How Can You Encrypt Files and Folders in Windows 10, 8 or 7?

How Can You Encrypt Files and Folders in Windows 10, 8 or 7? You can encrypt files and folders in Windows (vers. 7-10) using BitLocker. This Vista operating system extension has on-disk encryption as well as key management capability. It’s protected by two-factor authentication, so anyone who wants to crack the code needs a hardware […]

Microsoft’s Hyper-V Server 2019 Finally Released: Here’s What You Need to Know

Microsoft’s Hyper-V Server 2019 Finally Released After being plagued with everything from data loss issues to a lack of available hardware, Microsoft finally released their long-awaited Hyper-V Server 2019 to their Evaluation Center approximately eight months after the expected release date of October 2, 2018. This is even after the Microsoft team skipped the crucial RTM (“release-to-manufacturing”) […]

Arming the Next Generation of Cyber Warriors

There are everyday warriors in businesses across the country, but these individuals may never have worn the uniform of their country. This next generation of cyber warriors is being groomed by organizations of all sizes in an attempt to overcome the growing skills gap in the cybersecurity world. While many current cybersecurity analysts started in […]