Security Blog

Feature development & monitoring tips

Latest news

March 26, 2019

Beyond Passwords

In our last blog we spoke about how using a simple passphrase is more secure than using a complex unfriendly password. This...

Find Out More
January 23, 2019

Why Developers Need A Pen Test

A quick Google search for ‘data breach’ returns countless results. Just recently our sister company, RapidSpike,  innocently found a data breach made...

Find Out More
August 16, 2018

What is Clone Phishing?

This blog post covers Clone Phishing. What is Clone Phishing? How can you protect yourself from this Social Engineering attack?

Find Out More
August 15, 2018

What is Whaling?

In a previous blog post, we explained the basics of Phishing. This post will go into detail on another type of Social...

Find Out More