SEVEN STEPS TO PROTECT YOUR SMARTPHONE


Our previous blog posts have examined the various cyber-based threats posed to Smartphones.  In this post, we examine seven steps that you can take to help mitigate those risks:   1. Use Two Factor Authentication:   This is also known as “2FA” for short. Two factor Authentication means that you are using two layers of […]

Read More…


ADIDAS DATA BREACH


Breach of security is a common topic in the news today, especially when it involves compromising the safety of consumers’ private information. Many consumers became more aware of the significant effects of data breaches earlier this year when the Facebook/Cambridge Analytica scandal broke out; although, we have seen many large data breaches in the past. […]

Read More…


LIKE A SHINY NEW TRACTOR


  Driving across the Midwestern states of Nebraska and Iowa this week led me to some interesting conclusions about modern farming. First, farms and crops come in all shapes and sizes. Second, there are farms that are clearly more equipped for the fast-paced lifestyle of modern America. Third, there are efficient ways to farm, and […]

Read More…


BE AWARE OF MALWARE


  Cybersecurity is a growing field in this developing technology era; it is something that any organization has to pay attention to because of the many cyber threats present in today’s society. Read the following blog post written by Chris Brook for Digital Guardian about potential, and very destructive, malware threats.     Being aware of […]

Read More…


THE TOP SECURITY THREATS TO SMARTPHONES – PART 3


In this post, we continue our series on the top threats to Smartphones in 2018, with a brand-new kind of cyber threat:  Ransomware.   In this cyber-attack, cyber attackers want to hold your Smartphone hostage until you literally pay a ransom payment. This kind of attack is known as Ransomware which is described as a […]

Read More…


4 Reasons Why Online Education is an Effective Tool for Instructors


Many institutions have introduced online learning tools into course content.  According to Online Learning Consortium, about 28 percent of higher education students were enrolled in at least one online course in 2016. With more and more students entering institutions of higher education, online coursework has become an effective tool for instructors as they struggle with […]

Read More…


The Top Security Threats to Smartphones – Part 2


In this post, we continue our series on the top threats to Smartphones in 2018. Here is what you need to know about Network Spoofing and Phishing Attacks.   Network Spoofing This Smartphone security vulnerability goes back to the use of public Wi-Fi Hotspots that are found in places like Starbuck’s or Panera Bread.  Before […]

Read More…


Pillars of a Secure Organization


Columns, or pillars, have been an architectural staple since as early as 2600 B.C. Every significant civilization of the Iron Age (1300 B.C. to 100 B.C.) used pillars in their architecture. Even to this day, in many instances, those pillars of the Iron Age have proven to withstand the test of time.   Anyone who has traveled […]

Read More…


The Top Security Threats to Smartphones


What are the top threats to smartphones in 2018?  There are many of them, and we will be examining them in detail over several blog posts.  We begin with Data Leakage and Unsecured Wi-Fi Hotspots.   1. Data Leakage: This is not a direct attack by a Cyber attacker per se but is a flaw […]

Read More…


5 Tips to Avoiding a Data Breach


Small business owners always have a lot on their minds. They are consumed by thoughts about delivering great customer service and keeping products and services on the cutting edge to keep up with competitors.   With all of this on a business owners mind, something that often gets overlooked is security.  Security may be thought […]

Read More…