by Liquid Video Technologies | Aug 18, 2021 | Business, Central Monitoring, Cybersecurity, Data Breaches, Hacker, Home Security, Https, Malware, Monitoring, Network Security, Ransomware, Security, Security Breach, Websites
News and commentary on ransomware have hit a fever pitch with recent, high-profile attacks against global software management provider Kaseya, gas supplier Colonial Pipeline, popular Cape Cod ferry service, The Steamship Authority, and JBS, the world’s largest...
by Liquid Video Technologies | Aug 11, 2021 | Burglar Alarms, Business, Home Monitoring, Home Protection, Home Security, IP Video Storage, Job Performance, Mobile Access Control, Monitoring, Network Security, Network Video Recorder, Security, Security Cameras, Smart Home, Video Production, Video Surveillance
Most business owners or operators know they need some type of video surveillance – whether it’s for inventory protection, IT servers holding sensitive data, or managing day-to-day operations, security is an essential part of running a business. For those...
by Liquid Video Technologies | Aug 2, 2021 | Cybersecurity, Data Breaches, Hacker, Home Security, Malware, Monitoring, Network Security, Ransomware, Security
Intelligence agencies in Australia, the U.K., and the U.S. issued a joint advisory on Wednesday detailing the most exploited vulnerabilities in 2020 and 2021, once again demonstrating how threat actors are able to swiftly weaponize publically disclosed flaws to their...
by Liquid Video Technologies | Jul 30, 2021 | Business, Cybersecurity, Data Breaches, Hacker, Home Security, Https, Malware, Monitoring, Network Security, Security, Security Breach, Websites
Cybersecurity researchers lifted the lid on a previously undocumented malware strain dubbed, “MosaicLoader” that singles out individuals searching for cracked software as a part of a global campaign. The malware strain installs a Windows utility on...
by Liquid Video Technologies | Jul 28, 2021 | Biometrics, Business, Cybersecurity, Hacker, Home Security, Malware, Monitoring, Network Security, Ransomware, Security, zero trust
Organizations today must give attention to their cybersecurity posture, including policies, procedures, and technical solutions for cybersecurity challenges. One key factor is the password policy. This post discusses problems with end-user password change requests and...
by Liquid Video Technologies | Jul 23, 2021 | Access Control, Biometrics, Business, Cybersecurity, Data Breaches, Hacker, Https, Malware, Monitoring, Network Security, Security, Security Breach, Websites
Password security was a problem even before the advent of widespread remote work. So, what happened post-pandemic? We developed new and creative approaches to password security that will help you safeguard your accounts. We also created five critical password security...
Recent Comments