Cybersecurity + IT Articles

Sorted By: Most Recent
Andrei Neacsu Andrei Neacsu
Updated on April 08, 2024

The OSI Model’s 7 Layers, Explained

The seven layers in the Open Systems Interconnection (OSI) model each serve a specific function and work together to create an efficient network communication system.

Image: Shutterstock / Built In
Katlyn Gallo Katlyn Gallo
Updated on April 08, 2024

Guide to Discretionary Access Control (DAC) With Examples

Discretionary access control, or DAC, is an approach to systems security in which administrators grant users permission to access resources. Our expert explains how it works here.

Image: Shutterstock / Built In
Mitchell Telatnik Mitchell Telatnik
Updated on April 08, 2024

What Is End-to-End Encryption?

End-to-end encryption is a secure communication method that allows only the sender and intended recipient to access the contents of a message or file. Here’s how it works.

Image: Built In / Shutterstock
Jessica Barker Jessica Barker
Updated on April 03, 2024

5 Tips to Protect Yourself Against Identity Fraud

Here are the red flags to watch out for — and the steps you can take before you even notice them.

Image: Shutterstock / Built In
Shree Mijarguttu Shree Mijarguttu
Updated on April 01, 2024

Top Security Risks of Cloud Computing

Cloud computing’s widespread adoption by businesses in recent years makes it a tempting target for cyberattackers. Our expert details some of the top risks you need to know and how to stay safe.

Image: Shutterstock / Built In
Raj Ananthanpillai Raj Ananthanpillai
Updated on March 06, 2024

How SMBs Can Battle Cybercriminals With Limited Resources

Don’t have the budget to hire a cybersecurity team? No problem. Here are four measures your SMB can take to prevent cyberattacks.

Image: Shutterstock / Built In
David Franklin David Franklin
Updated on February 21, 2024

You’re Probably Ignoring One of Your Biggest Vulnerabilities

Your company likely spends a lot of money on cybersecurity, but do you know how secure your online reputation is? You need to think about domain security.

Image: Shutterstock / Built In
Rik Ferguson Rik Ferguson
Updated on February 20, 2024

AI Is Accelerating the Post-Trust Era. Is Your Business Ready?

Just as AI gives threat actors a whole new suite of tools to execute attacks, its increasing implementation opens new vulnerabilities as well. Our expert offers tips for protecting yourself.

Image: Shutterstock / Built In
Mohamed Khey Mohamed Khey
Updated on February 20, 2024

How to Connect to SSH Without a Password

Secure shell protocol (SSH) enables secure data connection and remote command execution. Here’s how to configure SSH for passwordless logins. 

Image: Shutterstock / Built In
Matias Madou Matias Madou
Updated on January 24, 2024

Do Your Developers Have Enough Time for Security Training?

Investing in secure code training for developers can reap big rewards in the face of a challenging threat landscape, but only if people have the time they need to learn meaningful lessons.

Image: Shutterstock / Built In