Ted Hebert
Recent Posts
-
Top 10 Reasons to Choose GlobalSign
August 16, 2023Many businesses are making the switch to GlobalSign as their top PKI provider. Find out why…
-
What is Ransomware?
October 11, 2022Ransomware is the most common type of cyberattacks on businesses. But what exactly is it and how do…
-
Managed Service Providers – Cost of a Data Breach
October 21, 2020Let's explore the causes and costs to an MSP when a data breach occurs, and discuss some prevention…
-
Recognizing Opportunity in the Face of Challenge: How Channel Partners Can Thrive in Difficult Times
September 08, 2020Introducing the GlobalSign Partner Microsite, designed for easy dissemination of information about…
-
Tax Season is Coming…Late – Can you Still Digitally Sign Your Tax Return?
June 08, 2020Everything you need to know about whether you can digitally sign your tax return before the July 15…
-
A Remote NFL Draft, Zoom-Style - What Could Go Wrong?
April 23, 2020Due to the COVID-19 pandemic, the NFL is planning its first-ever remote draft. From a cybersecurity…
-
It's Time to Disable TLS 1.0 (and All SSL Versions) If You Haven't Already
March 04, 2020As of June 30, 2018, all websites need to use TLS 1.1 or higher to comply with PCI Data Security…
-
World Password Day: Is it Safe?
May 02, 2019The ramifications of individual cybersecurity breaches can be devastating. According to a recent…
-
RSA Wants Us All to Be Better…Let’s Crank it Up to 11
February 27, 2019We’ve all heard of consumer IoT device breaches leading to unnerving situations and events. But when…
-
US Cyber Strategy: Well…We’re Waiting…
December 06, 2018In a world where new attacks happen every day – action must be taken now - regardless of the state…
-
Beating Back Against a Cyber-Attack Hurricane: The National Risk Management Center is Born
September 18, 2018The Department of Homeland Security opens the National Risk Management Center which aim to identify…
-
What is Social Engineering? The Human Confidence Game
August 15, 2018Those that social engineer are hackers, conducting phishing-like scams with the objective of gaining…
-
Whats the Difference Between Privacy and Security?
July 17, 2018The difference between privacy and security is almost as debated as the chicken and the egg…
-
Cyber Bank Robberies Contribute to $1 Trillion in Cybercrime Losses
June 22, 2018One such market that’s going paperless due to the benefits it offers is education, as well as the…
-
Are Your Mobile Employees Your Biggest Security Threat?
May 30, 2018According to ComputerWeekly and the latest mobile security report by global mobile connectivity firm…
-
RSA 2018: The Six Most Common Pain Points
May 02, 2018After an interesting week in San Francisco for the RSA Security Conference, we look back at the…
-
The Importance of Code Signing Redux
March 23, 2018What? Another blog about code signing? Due to a recent string of related hacking events, we thought…
-
Endpoint Attacks Are Expensive and Life-Critical for the Healthcare Industry and Everyone
January 26, 2018With everyone and everything now considered an "endpoint", staying secure has become quite the task.…
-
Top 10 Reasons to Choose GlobalSign
January 19, 2018We thought it was about time we toot our own horn. Here's a list of everything we are most proud to…
-
By the Numbers: Cost of a Data Breach and Procrastination
December 28, 2017Ponemon released a report called 'Costs of a Data Breach in the US in 2017'. We take a look at this…
-
Another Week – Another Ransomware Attack – Time to Kill the “Bad Rabbit”
October 30, 2017Bad Rabbit ransomware, while seemingly not spreading anymore, could still be a danger to you! Check…
-
KRACK Wi-Fi Vulnerability: What It Is and How to Protect Yourself
October 18, 2017The KRACK Wi-Fi vulnerability was discovered on Monday and affects all WPA2 protocols. For a quick…
-
When Black Friday Comes: Ready, Set, Threat!
September 22, 2017Black Friday is on the horizon. With fraud and cybercrime set to increase heavily during this time,…
-
What is Regulation CFR21 Part 11?
September 15, 2017Does your business operate with biotechnology, drug or medical equipment? Then you're probably being…
-
Playing Dominoes: Cybercrime, Attacks, Critical Infrastructure and Executive Orders
September 05, 2017With over 50% of respondents indicating that they roll-out new technology before having proper…
-
Super Malware “Industroyer” Threatens Power Grid
June 20, 2017A new strain of malware dubbed "industroyer" threatens to take down any power grid it can get into.…
-
Digital Signatures in the Financial Services Landscape
May 31, 2017In such a highly regulated industry like financial services it is no surprise that there are several…