
Hugh J.
Hugh Taylor is a Certified Information Security Manager (CISM) who has written about cybersecurity, compliance, and enterprise technology for such clients as Microsoft, IBM, SAP, HPE, Oracle, Google, and Advanced Micro Devices. He has served in executive roles at Microsoft, IBM, and several venture-backed technology startups. Hugh is the author of multiple books about business, security, and technology

Learn what data encryption is, how it works, and best practices to secure your files, sensitive data, and personal information.
Is your computer hacked? Learn how to find out if you’ve been hacked, what to do, who to call, and how to prevent being a victim again.
Discover essential tips to safeguard your phone from hackers and threats. From app security to data protection, learn how to boost your phone’s defenses.
This is a complete guide on endpoint device security. Learn what it is, how it works, and the positive impact it can make on your organization.
Explore the challenges faced by cybersecurity for K12 schools as they grapple with increasingly common attacks and their profound impact on students and staff.
Not sure if you've been hacked? Look for these 12 warning signs—from suspicious logins and missing funds to ransomware and browser redirects. Plus what to do immediately if your accounts or devices are compromised.
Implementing zero trust security layering techniques
Billions of accounts and data points have been compromised in the past year, learn how it happened and how to minimize the fallout.