SEVEN STEPS TO PROTECT YOUR SMARTPHONE


Our previous blog posts have examined the various cyber-based threats posed to Smartphones.  In this post, we examine seven steps that you can take to help mitigate those risks:   1. Use Two Factor Authentication:   This is also known as “2FA” for short. Two factor Authentication means that you are using two layers of […]

Read More…


THE TOP SECURITY THREATS TO SMARTPHONES – PART 3


In this post, we continue our series on the top threats to Smartphones in 2018, with a brand-new kind of cyber threat:  Ransomware.   In this cyber-attack, cyber attackers want to hold your Smartphone hostage until you literally pay a ransom payment. This kind of attack is known as Ransomware which is described as a […]

Read More…


The Top Security Threats to Smartphones – Part 2


In this post, we continue our series on the top threats to Smartphones in 2018. Here is what you need to know about Network Spoofing and Phishing Attacks.   Network Spoofing This Smartphone security vulnerability goes back to the use of public Wi-Fi Hotspots that are found in places like Starbuck’s or Panera Bread.  Before […]

Read More…


The Top Security Threats to Smartphones


What are the top threats to smartphones in 2018?  There are many of them, and we will be examining them in detail over several blog posts.  We begin with Data Leakage and Unsecured Wi-Fi Hotspots.   1. Data Leakage: This is not a direct attack by a Cyber attacker per se but is a flaw […]

Read More…


An Introduction to the Internet of Things


Just stop for a minute and think about how much we are connected to our wireless devices.  For example, we use them every day to communicate with family and friends via email, text message, video sharing, etc.  If something were to happen to it, if it got lost or stolen, we would be paralyzed.   […]

Read More…