Jayden LyonsHow to Stay Safe Using QR CodesA QR code is a fast and convenient way to access a website, and businesses often use these codes on product packaging and promotional…May 27, 2022May 27, 2022
Jayden LyonsEssential Windows Key Shortcuts for IT SupportThe Windows key is a handy tool for information technology support professionals to assist customers with system navigation. IT pros can…May 19, 2022May 19, 2022
Jayden LyonsData Destruction by Onyx Ransomware: Bad Intentions or a Malware Bug?Onyx is an emerging ransomware gang making headlines recently due to its dangerous ransomware that actually destroys data rather than…May 18, 2022May 18, 2022
Jayden LyonsCybercrime Gang TA575 Capitalizes on Squid Game PhenomenonSquid Game? The Netflix megahit is taking the world by storm! I may be the only person who hasn’t watched it yet, but the premise is…Nov 7, 2021Nov 7, 2021
Jayden Lyons8 Steps to Onboard Microsoft Office 365 Data into SplunkAudit logs are a fantastic source of data and an essential tool for business compliance, security, and human resources in the digital age…Oct 31, 2021Oct 31, 2021
Jayden LyonsDecoding Trickbot — What You Need to KnowIf you follow cybersecurity news at all, you’ve probably heard of Trickbot. But what is it? Is it malware? Is it spyware? A botnet? A…Oct 31, 2021Oct 31, 2021
Jayden LyonsCOVID-19 Malware Threats Escalate During Global PandemicAs COVID-19 continues to wreak havoc across the globe, cybercriminals and ransomware operators are ramping up efforts to sow confusion and…Oct 19, 2021Oct 19, 2021