Security

Google Location Services and How They Apply to the Average User

In the dog days of summer, the news media started running a story about how Google’s location tracking services continue to track people even after they order their mobile device’s OS to quit it. A researcher from Princeton proved these claims by traveling through New York and into New Jersey after turning location services off on for hi Android smartphones,...

Read More

How to Go About Detecting Cryptomining

One of the most dangerous and upcoming threats out there is cryptojacking. This process involves a malicious entity installing cryptomining malware on a user’s device without their knowledge or consent, allowing for a steady, reliable stream of income. What are the details behind cryptomining, and how can you keep your devices from becoming complicit in the schemes of hackers? Let’s...

Read More

Is Your Business a Target for Internet-Based Threats?

It feels like only yesterday when the only action you needed to take to protect a computer was to install antivirus software. Back in the year 2000, there were around 50,000 known computer viruses. Today, that number is over 185 million unique malicious threats. I’m not even here to talk about viruses. That’s what antivirus is there to stop, and...

Read More

How to More Securely Utilize Your Email

Studies have shown that email still has a safe place in the business world, with an estimated 124.5 billion business emails sent and received each day. However, are the emails that your business is actually receiving safe? If you aren’t adopting the following practices in your daily business operations, they probably aren’t. With the right precautions, you and the rest...

Read More

Considering Payment Cards and Business Use of Them

People use all types of payment options. With more people moving away from cash as a payment option, businesses have to accept and process more payment card transactions. Depending on your business, it could put you in a very precarious position. Today, we will look at payment card statistics, and how the increase in payment card usage could end up...

Read More

The Key Facets to Managing Personally Identifiable Information

From an objective point of view, the amount of trust that people put with companies based on the Internet is pretty astounding. In addition to providing whatever product or service they offer, these companies are often given highly sensitive information with hardly a second thought from the consumer. Here, we’ll review how millions of people learn that this trust was...

Read More

Smartwatches Haven’t Become Much Smarter

The smartwatch has quite a few benefits, but anything that one might bring to the table is offset drastically by its position as a threat magnet. Vulnerabilities in smart watches and other wearable technology makes using these devices somewhat risky behavior. Today, we will look at some of the features of the modern smartwatch, how hackers are utilizing them to...

Read More

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to make sure a thief or hacker isn’t just walking into your office and making off with your...

Read More

The Modern Worker’s Cybersecurity Training

The modern office can be a pretty monotonous place. When people do similar tasks over and over again, their attention to detail can wane. That may be a problem for your operational efficiency, but depending on what the expectations are, it likely won’t end your company. Ransomware, on the other hand, can be a major problem for any organization it...

Read More

SamSam Is More than a Computer Virus

I think by now most people understand just how dangerous ransomware is. Even with some of the ridiculous names they have like Gandcrab, Jigsaw, and WannaCry. Hell, two strains even have names from the James Bond canon: LeChiffre and GoldenEye. But one funny-named strain of ransomware, SamSam, has been devastating information systems for sometime, and has caught the eye of...

Read More