Industry trends | Quick Read
Top 5+ Best Productivity Apps to Jumpstart Your Year and Their Security Levels
Ways to be more productive
Cybersecurity Basics | Quick Read
Freeware vs. Shareware vs. Open Source – What is Each and How to Use Them Safely
What type of software should your company use?
Security alerts | Quick Read
SECURITY ALERT: New Denmark Phishing Campaign Uses Package Sending Notification as Pretext
New phishing campaign spotted in Denmark
Account security | Quick Read
Superuser Accounts – What Are They and Why Should Your Company Stop Using Them?
How to de-escalate admin-type rights
Data security | Quick Read
DNS over HTTPS (DoH) – A Possible Replacement for VPN?
Should DNS over HTTPS become the golden standard?
Data security | Quick Read
Home Security Cameras: Safety and Privacy Issues Explained
How secure are home security cameras?
Access Management | Quick Read
What Is the Best Password Manager? Our Top 4 Options Analyzed
The Best alternatives to LastPass
All things Heimdal | Quick Read
Here's Why You Need to Add Another Layer of Security to Your Antivirus
And how proactive cyber security can enhance online protection
Data security | Quick Read
Is Pokemon Go Safe for Kids and Your Privacy?
Is Pokemon Go still a thing?
All things Heimdal | Quick Read
Heimdal™ Security Will Handle New Security Products from CSIS and Starts Development
How the New Security Products Fit in the Company’s Cybersecurity Suite. Further Development Plans Laid Out
Security alerts | Quick Read
SECURITY ALERT: Trickbot Launches BEC Attacks with Fake #MeToo Harassment Claims
The malicious emails claim the victim was reported for sexual harassment by a colleague. The fake claims cause the phishing victims to become infected with Trickbot.
Security alerts | Quick Read
Patch Your Systems Right Away if You’re Running Windows 7, Windows Server 2008 R2 or Windows Server 2008!
Security alerts | Quick Read
SECURITY ALERT: New Fake Subpoena Phishing Campaign Spotted, Installing Predator
The malicious campaign installs Predator the Thief info stealer. How the fake subpoena phishing campaign works.
Account security | Quick Read
How to Delete Instagram Account Permanently: Step-by-Step Guide and Privacy Advice
Should you delete or activate your Instagram account?
Industry trends | Quick Read
Cyber Insurance: Should You Consider It For Your Company?
All You Need to Know About Cyber Insurance
How to | Quick Read
Top 13+ Scary Halloween Computer Pranks to Share a Laugh
How to go trick-or-treating in the digital realm. Cool Halloween computer jokes and pranks to pull.
Data security | Quick Read
Is Adobe Flash Player Really Worth the Trouble?
How to | Quick Read
How to Convert YouTube Videos to mp3: Free Apps and Step-by-Step Guide
Easy YouTube Video to Mp3 Conversion
Security alerts | Quick Read
New Microsoft Phishing Campaign Targets Office365 Users
Links to the phishing domains come from compromised accounts (including LinkedIn). How hackers combine tactics in an advanced phishing threat.
Industry trends | Quick Read
Cybersecurity and Biology: Biomimicry and Innovation Inspired by Nature
What Cybersecurity and Biology Have in Common. How Biomimicry Can Help Us Devise Better Cybersecurity
Security alerts | Quick Read
Scam Alert: Digi Phishing Campaign Detected, Asking Credentials for a Prize
A different fake social accounts campaign also used Digi branding. Potential of electoral fraud in addition to financial fraud.
Data security | Quick Read
The most (un)common cryptocurrency fraud and scams you need to look out for
Institutions | Quick Read
GDPR after Brexit: No Deal and All Other Exit Scenarios Explained
What happens if there is a No Deal Brexit. How will data compliance change after Brexit.
All things Heimdal | Quick Read
How the new email security solution will work & how it will impact the security landscape.
Security alerts | Quick Read
SECURITY ALERT: Massive Data Leak Revealed the Sensitive Information of Millions of People
What are the Companies Affected and How You Can Protect Yourself
Data security | Quick Read
4+ Essential Data Protection Steps to Take Before You Sell Your Phone
What to do before selling your phone
Endpoint security | Quick Read
5G Dangers: What are the Cybersecurity Implications?
Watch out for these 5G threats in your organization
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats