The enemy is us: a look at insider threats

It could be the engineer in the IT department, the janitor mopping the lobby, one of the many managers two floors up, or the contractor who’s been in and out the office for weeks now. Or, maybe it could be you. It could be the engineer in th… Continue reading The enemy is us: a look at insider threats

Social engineering attacks: What makes you susceptible?

Cybercriminals will do what it takes to get what they want, whether that’s breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here’s how to tell if you’re susce… Continue reading Social engineering attacks: What makes you susceptible?

A primer: How to stay safe on Amazon’s Prime Day Sale

While Amazon is poised for its fourth year run of Prime Day, the e-commerce giant’s annual flash sales event for Prime members, shoppers on the hunt for bargain deals are ready and revving, too. But before you review your shopping list, let … Continue reading A primer: How to stay safe on Amazon’s Prime Day Sale

When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained

Maybe it’s the quirky way some tech writers abbreviate it, or the surreal way it reminded you of that popular Michael Jackson song. Whatever triggers you to remember the term, for most of us, man-in-the-middle embodies something both familia… Continue reading When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained

Internet Safety Month: How to manage your child’s online presence

Parents with good intentions may not realize that by sharing photos of their children on social media, they have already created their online presence. The good news is that their online reputation can be managed, and you can teach them how t… Continue reading Internet Safety Month: How to manage your child’s online presence

Internet Safety Month: How to protect your child’s privacy online

This month is Internet Safety Month, and today we’ll be talking about online privacy for children. For parents and caretakers, nothing could be more troubling than the thought of having your child’s personal information stolen and used by nefariou… Continue reading Internet Safety Month: How to protect your child’s privacy online

Engaging students in cybersecurity: a primer for educators

The continuing rise of cybercrime calls for a new breed of fighters. Are teachers prepared to take on the challenge of training the current and future generations of cybersecurity professionals? How can they introduce and engage students in this f… Continue reading Engaging students in cybersecurity: a primer for educators

Securing financial data of the future: behavioral biometrics explained

Sophisticated social engineering. Fileless malware. Specialized Trojans. These are the threats that keep the financial sector on its toes—making way for a new mode of authentication called behavioral biometrics. And its primary concern… Continue reading Securing financial data of the future: behavioral biometrics explained

5 cybersecurity questions retailers must ask to protect their businesses

If retailers think they already have much to worry about, they have another thing coming— cybersecurity—and it’s no longer something they can keep on the back burner. This piece helps retailers ask the right cybersecurity questions to … Continue reading 5 cybersecurity questions retailers must ask to protect their businesses

Physician, protect thyself: An ounce of prevention is worth a pound of cure

In this final installment of “Physician, protect thyself,” we take a look at two key roles in small- to medium-sized hospitals and outpatient clinics that must step up their cybersecurity game to protect patients and staff alike.
Categories:

101… Continue reading Physician, protect thyself: An ounce of prevention is worth a pound of cure