<img src="https://ws.zoominfo.com/pixel/S1z9uESjqrFHFiBHM3vt" width="1" height="1" style="display: none;">

The Locknet Blog

Subscribe to weekly top industry articles written by our experts - delivered to your inbox.

What is a vulnerability assessment?

You may have heard about vulnerability assessments, and wondered to yourself whether your company needs one, whether you are at risk, and what it should include.

Read More


Tips for Protecting Data Privacy

No doubt by now we have all heard that data privacy is important, and we have seen the evidence of why in news of data breaches and identity theft. But the concept still seems ...

Read More


Here's what to look for with these scams

As tax season is upon us, it's important to be aware of social engineering scams like W-2 phishing scams. For many of us, tax season means ...

Read More


Recent hack of water treatment facility highlights importance of cyber attack prevention

About a month ago,

Read More


Typosquatting protection starts with education

Typos happen. But typosquatting can render big problems for those who mistype into the browser bar these days. But what is ...

Read More
Social Engineering
Posted by Jay Garza


What it is, what to look for and how hackers do it

Social engineering is a favorite play in the hacker handbook. But what exactly is social ...

Read More


Cybersecurity Month reminds us: security awareness is essential

Read More
What is SD-WAN?
Posted by Ben Potaracke


SD-WAN has many advantages; here is what you need to know

What is SD-WAN? If the ...

Read More