
- February 18, 2021
- Sam Bocetta
Privacy with Personality: The Trend Towards Online Pseudonymity
It’s possible that in a few years, we will enter a new age of digital privacy. In this article, we will discuss the increasing danger of sharing…
It’s possible that in a few years, we will enter a new age of digital privacy. In this article, we will discuss the increasing danger of sharing…
If you don’t have the right online security measures in place, you risk your business falling victim to an attack like whaling, which usually results…
The new year promises new innovations and trends – in many ways, it will be the start of a new era. In this article we'll walk you through the…
Hackers. They’re a unique bunch. Naturally, they have decided to take advantage of the Coronavirus. Keep reading to see 3 ways hackers are wreaking havoc and trying to make a buck during this crisis.
As always there are a plethora of cybersecurity news stories to review. But certainly one of the of the most concerning stories of the week is the ransomware attack on a natural gas facility.
The California Consumer Protection Act (CCPA) went into effect on January 1, 2020. This article will explain what the CCPA is, who it affects, and why compliance is critical for ALL organizations.
One of the common pitfalls a company might fall into is assuming that its cybersecurity solutions are maintained and managed via standard risk assessments.
As a freelancer, balancing your need for privacy with your desire to get work can be difficult. Often, so many questions arise: Should you share personal information that can be used to identify you…
While getting people to trust online shopping was a huge hurdle for e-commerce 20 years ago, today’s online shoppers often think nothing of filling out forms and providing data.
The personal records of nearly every single resident of Ecuador, including 6.7 million children - even infants -- were exposed due to a colossal data breach. That works out to
Scams are an integral part of the online world. There are hundreds of different attack strategies used by cybercriminals. One of the classic scamming techniques is phishing
The recent hack against Capital One may be one of the biggest ever in terms of the number of customers affected as well as business impact. The breach on March 22 and 23, 2019 exposed the personal…
The recent hack against Capital One may be one of the biggest ever in terms of the number of customers affected as well as business impact. The breach on March 22 and 23, 2019 exposed the personal…
A division of 451 Research, the organization asked its members about their biggest security concerns. As illustrated below, the top two included user behavior and phishing. Endpoint security, the IoT…
Technology always keeps us on our toes. And while constant change and innovation is exciting, keeping up can be a double-edged sword. Perhaps the biggest challenge facing businesses today is privacy.
Although many business executives regularly assess the risks that could threaten their enterprises, they may not think online fraud is a threat. It may especially get overlooked at smaller operations.…
We like to laugh at scams. Once exposed, security risks that fooled thousands turn into stories of “Who could have fallen for that?”
Cryptojacking is the malicious use of a victim’s computer to mine cryptocurrency, and is a growing problem for both individual users and companies. If you’ve never heard of it before, that’s likely…