Vonahi Security's Blog
  • Vonahi Security Home
  • Blog
  • Weekly Threat Reports

best practices

A collection of 5 posts

Respect in Security
best practices

Respect in Security

At Vonahi Security, we believe every one deserves to be supported and encouraged to be unique individuals. We strive to create a welcoming and inclusive environment for all, driven by behavior that shows empathy, respect, and care for others. We stand by the Respect in Security pledge.

  • Alton Johnson
    Alton Johnson
3 min read
Top 5 Ways to Secure Your Online Accounts
best practices

Top 5 Ways to Secure Your Online Accounts

Here are our top 5 recommendations for securing your online accounts as your digital footprint continues to grow.

  • Alton Johnson
    Alton Johnson
3 min read
Top 4 Ways to Secure Your WordPress Installation
best practices

Top 4 Ways to Secure Your WordPress Installation

WordPress is one of the most used content management systems (CMS) used in today's age. Learn how to keep it secure from the most common threats.

  • Alton Johnson
    Alton Johnson
5 min read
How Opening a PDF Could Leak Your Account Credentials
best practices

How Opening a PDF Could Leak Your Account Credentials

Opening a malicious PDF could result in the leakage of your user account credentials. Check out our blog to understand why this could put your data at risk.

  • Alton Johnson
    Alton Johnson
3 min read
Detecting and Preventing Common Microsoft Office Exploits
best practices

Detecting and Preventing Common Microsoft Office Exploits

Can your organization protect against the latest Microsoft Dynamic Data Exchange (DDE) and Macro Security Exploits? Read on for more information.

  • Alton Johnson
    Alton Johnson
7 min read
Vonahi Security's Blog © 2025
Latest Posts Facebook Twitter LinkedIn GitHub