Skip to content
e43c441c-4751-4b39-9b2c-455b409ed373

OXEN Technology Insights

Get the latest news, trends and advancements from OXEN.
Kelle WhiteMar 6, 2024

Real-Life Examples of How AI Was Used to Breach Businesses

There has been a lot of talk recently, about how hackers are leveraging AI to breach ...
Start Reading
Kelle WhiteFeb 15, 2024

How Is AI Used Against Your Employees

Artificial intelligence has evolved dramatically, and the improvements are evident. In ...
Start Reading
Kelle WhiteDec 6, 2023

Top Mistakes to Avoid When Training Staff on Cybersecurity

As technology continues to advance, so do the techniques used by hackers. We must keep up ...
Start Reading
Kelle WhiteNov 15, 2023

Training Employees to Spot Social Engineering

Social engineering is one of the newest methods hackers use to access sensitive ...
Start Reading
Kelle WhiteOct 24, 2023

Is Your Organization Prepared to Respond to a Security Incident?

One cybersecurity incident takes place every 14 seconds. Contrary to common assumptions, ...
Start Reading
Kelle WhiteOct 11, 2023

The Top 7 Mobile Security Threats to Address in Your BYOD Policy

BYOD or Bring Your Own Device is a modern practice where employees use their personally ...
Start Reading
Kelle WhiteOct 4, 2023

Why Cybersecurity Insurance Matters

As businesses move forward into a digital environment, cybersecurity insurance becomes ...
Start Reading
Kelle WhiteJun 15, 2023

Top 5 Ways Your Business Can Be Impacted without a BDR Plan

A backup and disaster recovery plan is crucial for every business, regardless of industry ...
Start Reading
Oxen TechApr 25, 2023

The Role of Technology in Businesses in 2023

Technology has always played a key role in businesses across different industries in ...
Start Reading
Kelle WhiteJan 23, 2023

January Recap: All You Need to Know About Social Engineering

This month, we covered a range of topics concerning social engineering. Social ...
Start Reading
Kelle WhiteJan 16, 2023

The Top 5 Ways Cybercriminals Use Social Engineering

Advanced technology and cutting-edge hacking techniques have been the main tool that ...
Start Reading
Kelle WhiteJan 9, 2023

Where Does Social Engineering Scams Come from?

Social engineering scams are so much more rampant these days than ever before. There will ...
Start Reading