Most of the civilized world is on the Internet every day – businesses large and small, governments, educators, adults, children and, unfortunately, criminals. The Internet may seem like a world without boundaries allowing us to find just about any kind of information, learn about other cultures, conduct business across the globe and even socialize with family and friends. Like many …
Our Top Cyber-Safety Tips for the Holidays
The upcoming holidays can be rife with cyber-crime. Many of us are experiencing the joys of the season and may be less inclined to keep our guards up. Crooks know this and respond by bringing their A game. Here are some key areas of concerns as well as a few tips to avoid getting hacked: Public Wi-Fi Use public Wi-Fi …
Outdated firmware: An overlooked threat
If most of your company’s computers are obsolete, they double or even triple your chances of experiencing a data breach. This emphasizes how dangerous it is to have outdated applications, operating systems, and even web browsers. Failing to update your firmware could expose your business to major security threats. What is firmware? Firmware is a basic type of software that …
3 Ways to Browse The Net Safely at Work
Amidst the current climate of malware, hacks, and phishing scams, the internet really isn’t safe for any company that doesn’t take precautions. Without safeguards, browsers that you or your employees use are vulnerable to cyber attacks that may cripple productivity and profit. There are wise steps that every company should take to browse the net safely. Data stored on desktops, …
Secure your Mac computer in 6 easy ways
If you’re a Mac user, data privacy and security should be your #1 priority. Without the right security measures, you’re inviting cybercriminals to steal your critical data. Are you willing to take the risk? Secure your computer and fortify your defenses with these six tips. The basics First, let’s start with the basics and head over to the Security & …
Don’t let hackers fool you with these tricks
The volume of malicious cyber attacks is increasing every year. Although many companies use the latest network security systems, they aren’t immune to the hackers’ favorite strategy — social engineering. Unlike malware, social engineering tricks people into volunteering sensitive data. Here’s what you should know to protect your business. Phishing This is the most frequently used social engineering attack, especially …
Cyber Security Truths To Live By – Part 3
#10 Consider Identity Theft Protection It’s not a matter of if, it’s a matter of when. Pardon the cynicism but we all have a 1 in 4 chance of getting hit. Long before the Internet took off, a lot of paper records included personal identifying information (“PII”) which is now at large. Georgia Driver’s licenses used to include your Social …
Cyber Security Truths To Live By – Part 2
#6 Social Engineering Takes Many Forms Baiting offers the reader something in exchange for private information. This could take the form of a free music download or a glimpse at once svelte movie stars who now look like train wrecks in their bathing suits. Quizzes on Facebook may seem perfectly innocent but, in some instances, you may be submitting answers …
Cyber Security Truths To Live By – Part 1
#1 It’s Not A Technology Problem. It’s A People Problem When it comes to security, your organization is very similar to a house. For protection, you have doors, locks, windows and fences. To detect threats, you have alarms, motion detectors, monitoring and crime watch. To respond to threats, you might have your own arsenal or methods to this. But intruders …
How to minimize risks after a data breach
Despite efforts to protect your data, some breaches are beyond your control. When an online company with your personal details gets hacked, you have no choice but to manage your risks on your own. These practical tips can help you reduce risks of identity theft and other threats. Determine what was breached Whether its names, addresses, email addresses, or social …
More leaks from Equifax breach
The Equifax breach in 2017 exposed the personal information of 145.5 million people in the US and some parts of the UK and Canada, but the number of victims keeps increasing. In the beginning of March, the credit-reporting company revealed that more personal information was leaked. Read on to find out more about this latest development. What happened? On March …
Are hackers using your PC to mine Bitcoin?
Cryptocurrencies like Bitcoin and Monero are so popular because they’re secure and potentially worth thousands of dollars. But investors and consumers aren’t the only ones interested in them. Hackers are using malicious tactics to steal cryptocurrency, and they’re doing it with something called cryptojacking. Hijacked hardware Cryptojacking secretly uses your computer to calculate complex mathematical problems to generate cryptocurrency. They …