We live in a world where technology rules. From our phones to our cars, we are constantly connected to something, somewhere, at all times. In most cases, the convenience of technology enhances the quality of our lives. But as consumers, there are technology risks and threats we need to be aware (and beware) of. We don’t mean to spook you, but let’s talk about the scary side of the cyber world.
Page 32 of 65
California’s capital held its second annual WordCamp Sacramento this weekend at Sacramento State University’s Harper Alumni Center. #WCSAC spanned two days and offered two separate tracks, Calaveras and El Dorado, in the theme of the gold rush. Compared to last year when it was just getting its legs underneath it, WCSAC has really grown into a camp to be reckoned with.
The term, “security by obscurity” implies that the less popular and attention grabbing your website is, the less likely it is to be targeted by cybercriminals. The truth is, there is no such thing as “too small to hack.” Read our infographic to learn more.
The data from this infographic was updated in Q2 2017. Be sure to check out our updated Security by Obscurity infographic with new data.
Websites experience 22 cyberattacks per day on average. That’s more than 8,000 attacks per year, per website. You might assume the majority of these attacks are aimed at eCommerce sites because they accept and store credit card information, but actually, the eCommerce sector accounts for only one percent of compromised websites.
Perhaps you’re just getting started developing WordPress websites for clients, or maybe you’ve been doing it for years. Either way, it’s likely that you’ve found yourself managing multiple WordPress installations.
In this article, we’ll discuss some of the challenges of managing multiple websites and how to solve them by streamlining your workflow and task management.
In what became a very WordPress weekend, I attended WordCamp Cincinnati the day after attending WordCamp Rochester. Like Rochester, this too was Cincinnati’s inaugural camp. #WCCincy took place Saturday and Sunday in the modern concrete-metallic-designed Tangeman University Center at the University of Cincinnati.
In today’s episode of the community interview series, I spoke with Steve Bennett of Real Big Marketing. I first met Steve at WordCamp Northeast Ohio and then again this past weekend at WordCamp Ann Arbor. He’s a regular WordCamper and all-around nice guy.
Steve has been involved in client work for years and comes from a traditional print background. Watch while he describes how he found WordPress and why he utilizes it for marketing automation processes for clients.
“Law firms are tremendous concentrations of really critical, private information. Infiltrating those computer systems is a really optimal way to obtain economic and personal information,” a statement on the state of security for law firms by Bradford Bleier, unit chief of FBI cyber division.
Every day, law firms manage sensitive information for their clients, including mergers and acquisitions, investments, business strategies and other intellectual property. This has made them a prime target for phishing and cyberattacks. In fact, Cisco’s 2015 Annual Security Report named law firms as the seventh highest target for cybercriminals. October is Cybersecurity Awareness Month, which is why now, more than ever, it is necessary to identify and resolve vulnerabilities within your firm.