
Hugh J.
Hugh Taylor is a Certified Information Security Manager (CISM) who has written about cybersecurity, compliance, and enterprise technology for such clients as Microsoft, IBM, SAP, HPE, Oracle, Google, and Advanced Micro Devices. He has served in executive roles at Microsoft, IBM, and several venture-backed technology startups. Hugh is the author of multiple books about business, security, and technology

Learn what data encryption is, how it works, and best practices to secure your files, sensitive data, and personal information.
Is your computer hacked? Learn how to find out if you’ve been hacked, what to do, who to call, and how to prevent being a victim again.
Discover essential tips to safeguard your phone from hackers and threats. From app security to data protection, learn how to boost your phone’s defenses.
This is a complete guide on endpoint device security. Learn what it is, how it works, and the positive impact it can make on your organization.
Explore the challenges faced by cybersecurity for K12 schools as they grapple with increasingly common attacks and their profound impact on students and staff.
Passwords that stopped working, logins from unknown locations, or apps you never installed? Here are the 12 clearest signs you've been hacked — with free verification tools and a step-by-step response plan.
Implementing zero trust security layering techniques
Billions of accounts and data points have been compromised in the past year, learn how it happened and how to minimize the fallout.