Secure Data Tech Blog

Secure Data's Top Ten Holiday Gifts for Techies

With the holidays just around the corner, everyone is getting their lists ready for the best gifts. Sometimes, though, it’s hard to find the perfect present, especially if someone seems to have…

read more

Six Simple Tips for Practicing Cyber-Safety at Work

Nearly 88% of all data breaches are caused by human error, which means your business is at risk every day because distracted employees do not know they're making a mistake. It can be as simple as…

read more

What's the Difference Between Phishing, Vishing and Smishing?

As security education is becoming more common in organizations and everyday life, phishing has been a term that people have become more familiar with over the years. What they may not know, is that…

read more

Four Important Tips to Help You Stay Safe Online

Understanding cyber-safety shouldn't be anything new in this day and age. Most young adults grew up learning how to be safe online; from talking to new people to keeping private information secure,…

read more

Meet Our Director of Engineering: An Interview with John Childers

Engineers are an interesting breed of people. Whether it be the long hours or the need for technical know-how to fix anything, the people that take these jobs can be a mystery. Well, wonder no longer…

read more

International Women's Day: 6 Pioneering Women Who Changed Technology

While we all know the significant names in tech, such as Wozniak and Musk, sometimes we forget about some other influential people in tech history. Specifically, the women who contributed to the…

read more

What's the Difference Between Help Desk and Managed Services

The difference between managed services and help desks can be a confusing one to follow. A natural pit to fall into is to call them both the same, which is incorrect. While both offer the similar…

read more

Six Types of Pen Testing & How Your Business Can Benefit from Each

When we’re talking about cybersecurity, the main focus is keeping intruders out of our precious systems and files. So why would a company willingly subject themselves to a cyberattack? This kind of…

read more

How to Stay Safe on Black Friday and Cyber Monday

Black Friday and Cyber Monday are every early Christmas buyer’s dream. These unofficial holidays are made to save consumers money with fantastic and sometimes unbelievable deals. Because so many…

read more

What's the Difference Between Internal and External Pen Testing

To keep your company safe from hackers, you have to be able to think like a hacker. That means that you might consider subjecting your network and systems to a pen test. A pen test, or penetration…

read more