5 cybersecurity questions retailers must ask to protect their businesses

If retailers think they already have much to worry about, they have another thing coming— cybersecurity—and it’s no longer something they can keep on the back burner. This piece helps retailers ask the right cybersecurity questions to … Continue reading 5 cybersecurity questions retailers must ask to protect their businesses

Keeping your business and personal instant messages secure

Most people want to know their instant messages are securely wrapped up—whether that’s for personal privacy or protecting business communications. There are a lot of solutions out there for better securing IMs.
Categories:

101
How-tos

Ta… Continue reading Keeping your business and personal instant messages secure

Physician, protect thyself: An ounce of prevention is worth a pound of cure

In this final installment of “Physician, protect thyself,” we take a look at two key roles in small- to medium-sized hospitals and outpatient clinics that must step up their cybersecurity game to protect patients and staff alike.
Categories:

101… Continue reading Physician, protect thyself: An ounce of prevention is worth a pound of cure

You down with P2P? 10 tips to secure your mobile payment app

Peer-to-peer (P2P) mobile transactions are on the rise, thanks to a number of mobile payment apps available on the market. In this post, we’ll look at the security risks of using P2P payment apps and what users can do to protect themselves.
Catego… Continue reading You down with P2P? 10 tips to secure your mobile payment app

The data breach epidemic: no info is safe

By now it’s obvious that data security technology hasn’t kept pace with the needs of consumers. In 2017 alone, we learned about massive data breaches from major organizations like Equifax, Uber, and Verizon. In other words: We’re… Continue reading The data breach epidemic: no info is safe

10 ways to protect your Android phone

How can Android users balance the power of better tech with the safety of best cybersecurity practices? Here are a few tried and true methods to protect your Android phone.
Categories:

101
How-tos

Tags: Androidandroid securitymobile securitypro… Continue reading 10 ways to protect your Android phone

Investors concerned about smartphone addiction; Apple responds with new webpage

Apple adds a new page to their website, aiming to address the growing trend of smartphone addiction in children and its harmful effects on users.
Categories:

101
FYI

Tags: Appleparental controlssecurity 101smartphone addictionteen security

(… Continue reading Investors concerned about smartphone addiction; Apple responds with new webpage

The digital entropy of death: what happens to your online accounts when you die

What happens to online accounts when we die? Not a cheerful subject by any stretch of the imagination, but the good news is there are options available—some, a little more sensible than others.
Categories:

101

Tags: after we diedeathdigit… Continue reading The digital entropy of death: what happens to your online accounts when you die

Building an incident response program: creating the framework

An incident response plan does not need to be overly complicated. However, having a solid and tested framework for the program is key in the ability of an organization to respond to and survive a security incident.
Categories:

101
Business

Tags… Continue reading Building an incident response program: creating the framework