DATA LOSS PREVENTION PART 3


  In this final piece about Data Loss Prevention, we examine some important characteristics of DLP Software Packages, and some of the leading ones that you should consider acquiring for your business or corporation.   DLP software packages come in three main categories:   Network based solutions These are typically installed at the endpoints of […]

Read More…


5 APPS FOR IMPROVING YOUR PHONE’S DATA SECURITY


  Ascend Education recently released part three of its series on the top smartphone security threats today. The article tackles cyber threats like screen lockers and ransomware. Considering that the topic is already in its third edition, it’s clear that our data can be compromised in creative and unexpected ways via our phones. It’s important […]

Read More…


AN FBI WARNING ON ATM CASHOUT ATTACK


Brian Krebs, on his blog Krebs on Security,  shares a warning to all consumers; the FBI has warned banks of an “unlimited operation” run by cyber criminals. Known as an “ATM cash-out,” it is a global and highly choreographed fraud scheme which uses cloned cards at ATMs. Supposedly, these cybercriminals can get ATM machines to […]

Read More…


DATA LOSS PREVENTION PART 1


  To any business or corporation, information and data are the blood flow of daily operations.  This consists of market intelligence as it relates to your competition, the sensitive customer information (such as contact info, credit card/banking numbers, etc.) and even your own internal data.  Safeguarding all of this data is a must, not only […]

Read More…


SEVEN STEPS TO PROTECT YOUR SMARTPHONE


Our previous blog posts have examined the various cyber-based threats posed to Smartphones.  In this post, we examine seven steps that you can take to help mitigate those risks:   1. Use Two Factor Authentication:   This is also known as “2FA” for short. Two factor Authentication means that you are using two layers of […]

Read More…


BE AWARE OF MALWARE


  Cybersecurity is a growing field in this developing technology era; it is something that any organization has to pay attention to because of the many cyber threats present in today’s society. Read the following blog post written by Chris Brook for Digital Guardian about potential, and very destructive, malware threats.     Being aware of […]

Read More…


THE TOP SECURITY THREATS TO SMARTPHONES – PART 3


In this post, we continue our series on the top threats to Smartphones in 2018, with a brand-new kind of cyber threat:  Ransomware.   In this cyber-attack, cyber attackers want to hold your Smartphone hostage until you literally pay a ransom payment. This kind of attack is known as Ransomware which is described as a […]

Read More…


The Top Security Threats to Smartphones – Part 2


In this post, we continue our series on the top threats to Smartphones in 2018. Here is what you need to know about Network Spoofing and Phishing Attacks.   Network Spoofing This Smartphone security vulnerability goes back to the use of public Wi-Fi Hotspots that are found in places like Starbuck’s or Panera Bread.  Before […]

Read More…


Pillars of a Secure Organization


Columns, or pillars, have been an architectural staple since as early as 2600 B.C. Every significant civilization of the Iron Age (1300 B.C. to 100 B.C.) used pillars in their architecture. Even to this day, in many instances, those pillars of the Iron Age have proven to withstand the test of time.   Anyone who has traveled […]

Read More…


The Top Security Threats to Smartphones


What are the top threats to smartphones in 2018?  There are many of them, and we will be examining them in detail over several blog posts.  We begin with Data Leakage and Unsecured Wi-Fi Hotspots.   1. Data Leakage: This is not a direct attack by a Cyber attacker per se but is a flaw […]

Read More…