Security & Privacy

February 27, 2017

How Yahoo’s Massive Data Breaches Could Leave Your Business Vulnerable

With so many credentials to remember, people often reuse passwords or variations of them. Are you one of those individuals? If so, your company might be […]
January 24, 2017

5 Ways to Protect Your Data in the Cloud

Cloud computing is now the norm — 95 percent of businesses worldwide are using at least one cloud service, according to a 2016 study. While there […]
November 15, 2016

6 Common Data Security Beliefs That Just Aren’t True

When it comes to security, misinformation can be dangerous. You might think that your data is safe based on what you have read on the Internet, […]
November 15, 2016

How Hackers Con Employees to Steal Company Data

A company’s database administrator loves social media. He does not put any detailed information about his job on social media sites, but like many people, he […]
November 15, 2016

Been Breached? The Law May Require You to Report It

The costs of a data breach add up quickly. The average total cost of a data breach in 2015 was $3.8 million, according to the Ponemon […]
November 3, 2016

What You Need to Know about the Yahoo Data Breach

On September 22, 2016, Yahoo announced that it discovered evidence of a data breach that occurred back in 2014. Although this data breach occurred a long […]
October 25, 2016

Cybercriminals Now Using Legitimate PayPal Emails in Scam

PayPal scams are nothing new. What is new is that cybercriminals have started using legitimate PayPal services to perpetrate those cyberattacks. In July 2016, cybercriminals sent […]
August 22, 2016

9 Signs That an Email Might Be a Phishing Scam

Phishing attacks are still a weapon of choice for cybercriminals. The most common way they carry out phishing attacks is through email messages. In email phishing […]
August 22, 2016

Devious Tricks That Cybercriminals Use to Scam Businesses

Cybercriminals have stolen $3.1 billion from businesses since January 2015 — not with high-tech ransomware or stealthy spyware, but rather with low-tech emails. The U.S. Federal […]