Product and service reviews are conducted independently by our editorial team, but we sometimes make money when you click on links. Learn more.


From antivirus software recommendations to cybersecurity tips, learn how to safeguard your business against potential attacks and scams.

Latest: Advice, Tips and Resources

5 Preventable Human Errors That Leave Your Company Vulnerable to a Cyberattack
By Alexandre François | May 21, 2018

Most cyberattacks stem from internal human error, but companies can protect themselves.

How Companies Are Detecting Spear Phishing Attacks Using Machine Learning
By Andrew Goldberg | May 18, 2018

As phishing emails become more sophisticated, companies are turning to machine learning.

5 Scams That Prey on Small Businesses
By Matt D'Angelo | April 11, 2018

Hackers are getting more creative. Learn how your business could be targeted.

Sponsored Advertisement
New York Mortgage Rates
New York's highly rated mortgage guide. In 30 seconds, get up to 5 competitive home loan, home equity or refinance offers from NY area lenders.
Has Your Company Secured These Overlooked Attack Vectors?
By Kevin Pickhardt | April 05, 2018

Many don't consider these three common security weaknesses.

The Best VPN and Proxy Services of 2020
By Adam Uzialko | March 27, 2018

Here are the best proxy services, which, like a virtual private network (VPN), allow you to change your IP address to protect your privacy.

How Crooks Hack Passwords and How You Can Protect Your Business
By David Balaban | January 31, 2018

The use of traditional passwords is a slippery slope for companies these days.

Sponsored Advertisement
Apple Rock Trade Show Displays
Trade show displays, custom trade show booths & rentals: Apple Rock is a leading strategic partner in event planning & trade show services.
WePay's John Canfield on Protecting Your Business From Scams
By Chad Brooks | October 18, 2017

WebPay CEO John Canfield says these are the new scams small business should watch for

Sponsored Advertisement
APG Cash Management Solutions
Global cash management solution provider for convenience stores, grocery, gas stations, quick serve restaurants, retail and hospitality environments.
5 Ways to Protect Your Business From Common Types of Fraud
By John Canfield | August 28, 2017

5 tips to protect your business when dealing with payments

The Costs of Mobile Payment Fraud and How to Avoid It
By Eran Feinstein | August 10, 2017

Stay up to date to protect your m-commerce customers

Is Your Business Ready for a Catastrophic Cloud Failure?
By Daan Pepijn | June 09, 2017

Here are the best practices that help ensure the reliability of your cloud-based systems.

How Real are the IoT Security Concerns?
By Maria Marinina | May 25, 2017

While there are real consequences for neglecting IoT security, it’s a mistake to feel as though nothing can be done about it. Users, network administrators and developers alike can take steps to make...

Effective IT Security Is Crucial for Branch and Remote Offices
By Megan Totka | May 22, 2017

At the end of the day, a company's security is really only as strong as its weakest link.

Endpoint Protection vs. Anti-Malware: What You Need to Know
By Andreas Rivera | April 17, 2017

Learn which cybersecurity solution is best for your business.

Restaurant Security: A Guide to Getting Your Money's Worth
By business.com editorial staff | February 21, 2017

It's hard to determine the ROI you will get from increasing your restaurant security.

10 Common Social Engineering Tactics Used by Attackers
By Jason Parms | July 25, 2016

Learn What Social Engineering Is and How to Protect Your Business From Predators

How to Use Marketing to Regain Public Trust After a Data Breach
By Zachary Evans | July 07, 2016

More companies than ever are the victims of massive data breaches. Do you have a plan to recover if it happens to you?

How to Integrate Application Security Testing Into the Agile Development Process
By Daan Pepijn | June 02, 2016

Testing and rooting out bugs are integral parts of any successful application development process. But what's the best way to go about it?

Stay Secure: 5 Key Steps to Taking a Proactive Approach to IT Security
By Daan Pepijn | April 18, 2016

Despite the increasing activity of hackers and the rise of security leaks, many companies underestimate the cost of security threats.

You've Been Hacked: Now What?
By Sarah Landrum | March 11, 2016

And about a third of chief information officers reported that they saw a 51 to 100 percent increase in cyber attacks in 2015.

Prepare for the Worst: How to Create a Cyber Security Incident Response Plan
By Jason Parms | January 13, 2016

Effective CSIR Plan is an essential aspect of organizations in data governance strategy to make aware about current security readiness.

The Security Risks in Social Media: Interview with Joseph Steinberg
By Daan Pepijn | January 05, 2016

Cybersecurity Expert Shares How to Minimize Risks Related to Social Media

Ironclad Inbox: How to Make Your Email Hack-Proof (For Real)
By Lauren Sirt | December 30, 2015

You might think your email is safe, but you could be in for a rude awakening. Here's how to lock it up, once and for all.

More Info, More Problems: Privacy and Security Issues in the Age of Big Data
By Jason Parms | December 16, 2015

Organizations are predicting key solutions for big data privacy and security in the cloud.

Internet of Things: Security, Compliance, Risks and Opportunities
By Daan Pepijn | November 06, 2015

The Internet of Things (IoT) is pushing an information-driven shift to connected devices in the enterprise world at large.