Cybersecurity + IT Articles

Sorted By: Most Recent
Sascha Giese Sascha Giese
Updated on October 09, 2024

How to Exorcise the Modern Horrors of IT

Your average IT team faces as many shadowy monsters as a camper in a horror movie. Our expert gives you some tools to battle back against them.

Image: Shutterstock / Built In
Christian Young Christian Young
Updated on October 04, 2024

What Is an Intrusion Detection System (IDS)?

An intrusion detection system is a security mechanism that continuously analyzes network traffic or system behavior to identify and alert users to potential unauthorized access attempts or policy breaches.

Image: Shutterstock / Built In
Nazy Fouladirad Nazy Fouladirad
Updated on October 01, 2024

So, You’ve Been Hacked. Now What?

Cyber attacks can happen to any company. Here’s what to do after a breach and how to protect your business against another one.

Image: Shutterstock / Built In
Updated on September 25, 2024

6 IT Companies in Montreal to Know

These leading Montreal IT companies offer expertise in areas ranging from custom software solutions to managed cybersecurity services.

Photo: Shutterstock
Updated on September 25, 2024

11 Companies Hiring Entry-Level IT Professionals

Entry-level IT professionals can work across a variety of industries, ranging from financial services to pharmaceutical manufacturing.

Photo: Shutterstock
Mark Weinstein Mark Weinstein
Updated on September 24, 2024

How to Keep Kids Safe Online Without Banning Encryption

While encryption may be the final frontier of digital privacy, it’s also rife with abuse. Here’s how to balance privacy with safety.

Image: Shutterstock / Built In
Metin Kortak Metin Kortak
Updated on September 12, 2024

Understanding ISO 42001: A Framework for Responsible AI

ISO 42001 controls and policies form the first international AI management system standard. Here's what you need to know.

Image: Shutterstock
Rebecca Tague Rebecca Tague
Updated on September 12, 2024

What Is an Advanced Persistent Threat (APT)?

APTs are sophisticated, often long-term cyberattacks where attackers establish a foothold within a network and remain undetected for an extended period.

Image: Shutterstock / Built In
Sashank Purighalla Sashank Purighalla
Updated on September 04, 2024

How to Keep Your Cloud Migration From Becoming Dangerous

Cloud computing offers businesses ample benefits, but making the switch can introduce myriad risks. Our expert explains how to handle the shift safely.

Image: Shutterstock / Built In
Andre Ferraz Andre Ferraz
Updated on August 30, 2024

3 Ways to Combat Fraud Across the Entire Organization

Support for an integrated fraud prevention program needs to come from the highest rungs of leadership and should focus on these three key goals.

Image: Shutterstock / Built In