<img src="https://ws.zoominfo.com/pixel/S1z9uESjqrFHFiBHM3vt" width="1" height="1" style="display: none;">
home3-Hero.jpg

The Locknet Blog

Subscribe to weekly top industry articles written by our experts - delivered to your inbox.

What is a vulnerability assessment?

You may have heard about vulnerability assessments, and wondered to yourself whether your company needs one, whether you are at risk, and what it should include.

Read More

 

Posting a selfie with your COVID vaccination card could put you at risk

If you're searching for "ways to protect my identity," start by resisting the temptation to post a selfie with your COVID vaccination card. ...

Read More

 

Tips for Protecting Data Privacy

No doubt by now we have all heard that data privacy is important, and we have seen the evidence of why in news of data breaches and identity theft. But the concept still seems ...

Read More

 

Here's what to look for with these scams

As tax season is upon us, it's important to be aware of social engineering scams like W-2 phishing scams. For many of us, tax season means ...

Read More

 

Was your MSP ready and there for you?

Experts say Hafnium hacker group, backed by the Chinese government, is responsible for the recent, massive Microsoft cyberattack that has put businesses around the ...

Read More

 

Recent hack of water treatment facility highlights importance of cyber attack prevention

About a month ago,

Read More

 

Typosquatting protection starts with education

Typos happen. But typosquatting can render big problems for those who mistype into the browser bar these days. But what is ...

Read More

With Zoom phishing emails, cybercriminals try to trick your staff

Remote workgroups have learned to lean on Microsoft Teams and Zoom as platforms for connecting during the pandemic; rest assured, cybercriminals have taken notice. Since the pandemic, ...

Read More