blog search

PurpleBox Blog

article search

Vulnerability Scanning

Vulnerability scanning is a systematic and automated review of security weaknesses...

Read More

Assessment and Testing Approaches for Cybersecurity

Security testing approaches; such as Penetration Testing (PenTest) and Red Teaming...

Read More

How Do Cybercriminals Take Advantage of COVID-19?

Remain vigilant against cyber risks and make sure our security teams are ready to prevent, dete...

Read More

6 Precaution Steps Against Identity Theft and Related Fraud Schemes

Protect yourself against Idenetity Threat and Tax Return, Medical Identity and Child Identity F...

Read More

Cybersecurity Awareness Month – 6 Approaches for better Security

Boost your Cybersecurity Awareness and make smart decisions when you use technology to protect ...

Read More

Cybersecurity Awareness Month – What to Know About Ransomware

Beware of ransomware attacks and learn about how to protect yourself and your company from bein...

Read More

October is National Cybersecurity Awareness Month

Review your cybersecurity awareness and readiness. Be prepared and protect your business from c...

Read More

Executive Speech Likely Violated HIPAA Privacy Rules'

HIPAA Privacy Training program is critical to ensure all employees are aware of the privacy rul...

Read More

Protect Yourself From WannaCry and Other Future Threats

Take your precautions against WannaCry Cyberattack and other possible future ransomware attacks...

Read More