top of page
Gold Comet Blog


How to Conduct an Email System Security Audit
Have you conducted a security audit to determine how vulnerable your system and communications may be to hacking?
Dec 21, 20223 min read


Telework Security: How Gold Comet Creates a Safer Environment
With remote work becoming a mainstream practice, enterprises must mitigate the risks to telework security with proactive cyber solutions.
Dec 14, 20223 min read


Cybercrimes: How Access to Your Data Can Start with a Simple Email
Di you know that your email system is the weakest link in your communication process and the first point of attack for cybercriminals a
Dec 7, 20222 min read


Data Protection and Security: How to Recover from a Security Breach (Part 4 of 4)
In this final article of the Data Protection and Security series, we will share actions you can take to Recover from a Security Breach.
Nov 30, 20224 min read


Data Protection and Security: Password Usage and Safety for Emails (Part 3 of 4)
This post on data protection and security (Part 3 of 4-part series) explores best practices for strong password usage and email safety.
Nov 16, 20223 min read


Data Protection and Security: Malware and Ransomware (Part 2 of 4)
Continuing our overview, we’ll address two more strategies of cyberattacks against data protection and security – Malware and Ransomware.
Nov 9, 20224 min read


Data Protection and Security: Phishing, Smishing, and Vishing (Part 1 of 4)
Cybercriminals are getting more creative in the strategies they use to interfere with data protection and security.
Oct 25, 20225 min read


GOLD COMET SUPPORTS PROJECT XANDER
Project Xander is a collaborative initiative launched by cyber leaders in the San Antonio, TX, area with a mission to find a solution.
Oct 13, 20222 min read
bottom of page
