Blog - ETTE

December 23, 2020

How to Update Your Remote Access Policy – And Why You Should Now

Remote Access Policies Activity from cybercriminals is at an all-time high. Data security has been compromised at several well-known...

Read More
Camila Navarro

December 16, 2020

What Are The 5 Major Cybersecurity Mistakes I Can Avoid As A Small Business Owner?

5 Major Cybersecurity Mistakes To Avoid With the conveniences that computers and the internet bring, cyber threats to our sensitive...

Read More
Camila Navarro

November 30, 2020

Mobile Browser Users open to Malware

Mobile Browser Bugs Rapid7, a cloud security company, has reported a new malware threat this October. The bug affects six different...

Read More
Lawrence

November 23, 2020

Zoom Rolls Out Encryption for All Users

End-to-End encryption (E2EE) After several false starts, the video-conferencing software Zoom is rolling out End-to-End encryption (E2EE)...

Read More
Lawrence

November 18, 2020

GravityRAT: Back to Earth with Android, macOS Spyware

GravityRAT Spyware GravityRAT pretends to be an application but in reality, is an espionage tool that steals people’s information....

Read More
Lawrence

November 11, 2020

How Weak Cybersecurity Can Hurt a Small Business

Businesses of all sizes collect and store hordes of data including consumers’ banking credentials — data that can be stolen and...

Read More
Jenny Bests

November 9, 2020

Facebook: A Top Launching Pad For Phishing Attacks

Facebook  Facebook is the heavyweight of social media platforms, dominating the others with 2.45 billion monthly users. While those...

Read More
Lawrence

October 11, 2020

How to Write a Cybersecurity Playbook During a Pandemic

Cybersecurity Playbook No one could have foreseen the COVID-19 pandemic. While most disaster recovery plans cover earthquakes, hurricanes,...

Read More
Lawrence

October 5, 2020

APIs Are the Next Frontier in Cybercrime

Next Frontier in Cybercrime Cybercrime has been on the rise and calls for necessary action to buff the security of your systems....

Read More
Lawrence

September 25, 2020

Five Tips For Managing Information Security In The Post-COVID World

Managing Information Security In The Post-COVID World The outbreak of the COVID-19 pandemic has not only brought disruption in the health...

Read More
Lawrence

September 18, 2020

Cybersecurity: A New Form of Growth for Business

Cybersecurity Cybersecurity has for a long time been a cost to companies, where preventing hacking was seen as a necessary component of...

Read More
Lawrence

September 11, 2020

New Risk Landscape

How Cybersecurity Leaders are Overcoming New Risks Having employees working from different locations has significantly increased the number...

Read More
Lawrence