Are you ready for next-gen email security? (YES!)

Google has introduced a tool called RETVec to enhance the security and cleanliness of your Gmail inbox by combating spam effectively. So what is RETVec? Lets simplify it. RETVec stands for Resilient and Efficient Text Vectorizer, which essentially helps Gmail identify and filter out spam emails that attempt to infiltrate your inbox. It’s interesting to […]

Combating the Digital Menace of Computer Worms: A Guide for Businesses

Combating the Digital Menace of Computer Worms: A Guide for Businesses In the digital garden of your business’s network, worms are the last guests you’d want. Unlike their soil-dwelling namesakes, computer worms are a nuisance, creating chaos in the otherwise healthy digital environment of your enterprise. Let’s explore these pesky digital worms and how you […]

Securing Your Cloud, Part 5: The Critical Importance of Timely Updates

Are you one of those who keeps hitting ‘remind me later’ on software updates? You’re not alone. Yet, staying on top of these updates is a crucial step in securing your cloud environment. Whether you’re just starting your cloud journey or already reaping the benefits of a robust cloud system, overlooking security is not an […]

Types of Malware: Viruses

Often, the word ‘virus’ is thrown around to label any kind of malicious software on a computer. However, a virus is in fact a distinct type of malware with its own unique dangers to your network. You might have frequently heard someone lament about their computer being infected with a virus. But what exactly does […]

Securing Your Cloud, Part 4: Manage Your User Accounts

Confidential financial details of your organisation shouldn’t be accessible to just anyone. Yet it’s surprising how many businesses are lax in controlling access to their crucial cloud data. User management isn’t a novel concept, but in our cloud-centric era, its significance has magnified. Proper user management can act as a safeguard for your company against […]

Securing Your Cloud. Part 3: Deploying CSPM Monitoring

Cloud security is about combining techniques to build a well-rounded, comprehensive strategy. Here, we’re taking a look at one of the strongest components of any cloud security solution: CSPM.  When moving to the cloud, digital security has got to be a top priority. Your data is no longer tucked away in your on-premises server where […]

The State of Malware in 2023

What’s new in the world of malware? At Perigon One, we’re here with all the latest news, trends, and updates, highlighting some of the hottest topics across the cybersecurity landscape throughout 2023.  With the end of the year almost within sight, we think that this is the perfect time to take a brief look into […]

How to Avoid ‘Juice Jacking’

You’ve heard of phishing. You’ve heard of malware. But have you heard of juice jacking? It’s one of the biggest threats facing remote workers today, but there are easy ways to reduce your risk.  In this world of remote working, it’s possible for employees to work from practically anywhere. And they are! As long as […]

Securing Your Cloud. Part 2: Encryption

When your data is being stored in the cloud, how can you make sure it remains safe and secure? The answer is simple: by using advanced encryption protocols that add an extra layer of protection.  From a purely security-focused standpoint, where’s the best place to store your data? It’s clear, isn’t it? With you! When […]

Securing Your Cloud – Part 1: Multi-Factor Authentication

The cloud may be the answer to many business problems, but it’s not without its risks. Luckily, there are solutions such as multi-factor authentication that are helping to keep the cloud more secure.  Storing critical business data in the cloud… it just makes sense, doesn’t it? When your vital information is stored virtually – and […]