Learn more about cybersecurity trends, potential new challenges, and recommended remediation approaches. You can rely on CyZen for the knowledge you need.
In a national effort to curtail the spread of the coronavirus (COVID-19), we are witnessing the rise of the remote workforce.
Most of us have heard of “ransomware,” but what is it? Who does it impact? How can you protect your business?
Effective January 1, 2020, the release of the California Consumer Privacy Act (“CCPA”) marks the beginning of “America’s GDPR.”
Check out these tips to help safeguard your business from third-party vendor attacks.
CyZen's Will Mendez discusses data privacy issues with photo sharing apps such as FaceApp and Snapchat. Read on to learn more!
As smart cities continually evolve to stay ahead of demand, owners and developers adapt by rapidly digitizing their buildings and transactions.
Our cybersecurity experts are here to guide you through four powerful techniques to protect your valuable assets.
2018 has proven that even the biggest companies—and government entities— aren’t immune from a growing number of cyber attacks.
No matter the destination, the risk of cyber-attacks soar the moment you hit the road. Here's a few tips on protecting your data while you're abroad.
With 230.5 million shoppers anticipated by 2021, online shopping provides a direct portal for cyber-attackers to victimize consumers.
I’s not time to panic yet, but your router, gateway to the internet highway, may be compromised.
Managing Director of CyZen, Jacob Lehmann, sat with Co-Founder and Managing Partner at XPAN Law Group, Jordan Fischer, to dive into details on GDPR.
Building automation systems ("BAS") ease property managers’ daily operations.
Since January 2016, cybersecurity incidents in Kindergarten through 12th grade public schools across the United States are up 223% year-over-year.
Take cybersecurity into your own hands with these five simple tips from CyZen's cybersecurity advisors.
Phishing campaigns topped the IRS “Dirty Dozen” List of Tax Scams for 2017.
Security researchers recently discovered a hardware information flaw in computer processors across millions of devices
* All fields are required
By choosing to submit data, you are agreeing to the storage and usage of your contact information to deliver the requested services.