Coro Cybersecurity received an AAA Rating from SE Labs for Enterprise Advanced Security Protection. Read the report
Coro Cybersecurity

Threats and Trends

August 24, 2023

Protecting Your Digital Domain: Recent Phishing Attack Trends Identified by Coro  

As the digital landscape continues to expand, so does the creativity of cybercriminals seeking to...
January 20, 2023

A growing list of schools being hacked

The world of cybersecurity is constantly changing. As professionals in this field, it's our job...
December 9, 2022

Cyberattacks target educational institutions

Here at the Coro blog, we write a lot of cybersecurity stories about business executives...
December 2, 2022

The price of a breach is an executive's future 

Consequences are increasing for companies that don't take cybersecurity seriously.  You might be thinking, "haven’t...
October 12, 2022

The dangers of employees using personal email on a work device

The decision to mix personal and work email: should you do it?  You and your...
October 4, 2022

How to tell if your mid-market company is under cyber attack 

Mid-market companies are falling victim to cyberattacks at an alarming rate. As such, we must...
September 22, 2022

Tennis and cybersecurity: avoiding unforced errors 

The U.S. Open Tennis Championships just wrapped in Queens, New York, a few subway stops...
August 2, 2022

Cyberthreats for the rest of 2022

Since the start of 2020, a cyber-warfare storm has been brewing. Hundreds of thousands of...
November 15, 2021

Does a Hidden SSID Make You Feel Safe? It Shouldn’t. Here’s Why.

Do Hidden SSIDs Work? The logic makes sense: If it can’t be seen, it can’t...
January 26, 2017

How Good Wireless Visibility Can Beat the Rogue Access Points

With wireless security, it’s all about visibility. Look around a coffee shop, airport, or even...
October 9, 2016

Hackers Can Bypass HTTPS Protection on Windows, Linux, and Mac

If you browse to a major website on the internet, chances are you'll see something...
September 19, 2016

The End for SMS-Based Two Factor Authentication

For home users and enterprise professionals alike, SMS-based two-factor authentication (2FA) has become a relatively...