The site navigation utilizes arrow, enter, escape, and space bar key commands. Left and right arrows move across top level links and expand / close menus in sub levels, if needed. Up and Down arrows will open main level menus and toggle through sub tier links, if needed. Enter and space open menus and escape closes them as well. Tab will move on to the next part of the site rather than go through menu items.
Business Email Compromise (BEC) attacks are a very common way for cybercriminals to gain access to sensitive information. Learn what they are, how they work and how we can help prevent these attacks!
One of the top malicious activities among users and businesses on the Internet is social engineering. Read our article to learn what it is and how to prevent against attacks.
Learn what 2 Factor Authentication is and how it works today!
Blacklisting and whitelisting are two tools you can use to protect your data from malicious activity. Read our article to explore the benefits.
Learn more about what email interception is, how to pick a secure email messaging system and more.
With COVID-19 pandemic unraveling globally, cybercriminals are using this is an opportunity to target individuals. Learn how to prevent this from happening to you.
Learn more about PGP encryption and how it works.
Our Gold Comet team will be attending the CISO Healthcare Exchange in Boston. Learn more about cyber security and how to protect against the ever growing cyber attacks.
Learn the difference between secure and encrypted emails in this article.
Consider using a password manager to keep your passwords secure. Learn more in this blog about what a password manager is and how it can be beneficial.