SCAMMERS ARE GETTING MORE CLEVER


Many people think they are exempt from being scammed; however, that is not the case! Scammers are becoming more and more clever in their schemes, and we all need to become more aware of these hurtful practices. No one is safe when it comes to falling victim to scams. Krebs on Security discusses how many […]

Read More…


DATA LOSS PREVENTION PART 3


  In this final piece about Data Loss Prevention, we examine some important characteristics of DLP Software Packages, and some of the leading ones that you should consider acquiring for your business or corporation.   DLP software packages come in three main categories:   Network based solutions These are typically installed at the endpoints of […]

Read More…


5 APPS FOR IMPROVING YOUR PHONE’S DATA SECURITY


  Ascend Education recently released part three of its series on the top smartphone security threats today. The article tackles cyber threats like screen lockers and ransomware. Considering that the topic is already in its third edition, it’s clear that our data can be compromised in creative and unexpected ways via our phones. It’s important […]

Read More…


AVOIDING CARD SKIMMERS AT THE PUMP


  Many of us have heard of fuel dispensers being a target for card-skimming devices.  Brian Krebs wrote a post on his blog “Krebs on Security” on how to avoid these card skimmers, and he uses the San Antonio Police Department as a source for tips. Some of these tips include using only new fuel […]

Read More…


THE TOP SECURITY THREATS TO SMARTPHONES – PART 3


In this post, we continue our series on the top threats to Smartphones in 2018, with a brand-new kind of cyber threat:  Ransomware.   In this cyber-attack, cyber attackers want to hold your Smartphone hostage until you literally pay a ransom payment. This kind of attack is known as Ransomware which is described as a […]

Read More…


The Top Security Threats to Smartphones


What are the top threats to smartphones in 2018?  There are many of them, and we will be examining them in detail over several blog posts.  We begin with Data Leakage and Unsecured Wi-Fi Hotspots.   1. Data Leakage: This is not a direct attack by a Cyber attacker per se but is a flaw […]

Read More…


5 Tips to Avoiding a Data Breach


Small business owners always have a lot on their minds. They are consumed by thoughts about delivering great customer service and keeping products and services on the cutting edge to keep up with competitors.   With all of this on a business owners mind, something that often gets overlooked is security.  Security may be thought […]

Read More…