The California Consumer Protection Act (CCPA) went into effect on January 1, 2020. In brief, “the CCPA grants California consumers robust data privacy rights and control over their personal information, including the right to know, the right to delete, and the right to opt-out of the sale of personal information that businesses collect, as well as additional protections for minors.” Notably for businesses, this law can affect any company, regardless of where they reside if the company does business in California and meets certain other requirements…
There’s no doubt that you’ve run into this issue at some point while browsing online. You were happily navigating to one of your favorite sites when all of a sudden you run into an SSL certificate error. So, what do you do? Do you proceed at your own peril? Should you not visit the site? Are there other options? Is this your website? So many questions. Hopefully, by understanding the causes of this issue, you can take a deliberate course of action that will allow you to safely browse the web and secure your website.
Last month we warned ransomware attacks are on the rise amidst the COVID-19 pandemic. While these attacks are bad enough in the best of times, ransomware continues to be a huge information security problem for all companies, municipalities and individuals. Even hospitals and healthcare professionals are getting warned about possible attacks as they provide care during this critical time. In these uncertain times, how prepared are you and your data against an attack?
Hopefully everyone who can work remotely is now working remotely due to government-mandated social distancing and stay-at-home advisories for COVID-19. Whether you’re a novice at working from home or a seasoned veteran, you will likely be affected by these at home privacy concerns, IT-related service impacts, and the latest Coronavirus cyber scams. Here’s what you should do to make your work at home experience as productive and secure as possible.
Phishing continues to be a huge security problem for everyone. While more than half of US organizations were successfully compromised by ransomware and phishing attacks last year according to Proofpoint, it also reported 90 percent of global organizations were targeted by business email compromise and spear phishing attacks. This ever-growing privacy risk affects home users, schools, businesses of all sizes, towns and even cities.
Every year privacy and security practitioners mark Data Privacy Day. This unique day falls on January 28 every year and is touted as “an international effort to create awareness about the importance of respecting privacy, safeguarding data and enabling trust.” You’re probably thinking to yourself, well that sounds great but what does that mean to me and my company?
No matter which holidays you celebrate, you want to enjoy them with friends and family. You also want to make sure you protect yourself from online scams and theft. More and more shoppers choose to do online holiday shopping rather visit brick and mortar stores. The National Retail Federation forecast that online sales are expected to grow between 11% and 14% for the 2019 holiday season, compared with 2018.
Navigating the world of cybersecurity can be overwhelming. Any wonder why the percentage of U.S. employees who lack a basic understanding of cybersecurity best practices is estimated to be 70%? One thing remains certain. No matter how large or small – any business (or employee) that thinks they are not at risk for a cyber attack is only fooling themselves.
October is Cybersecurity Awareness Month. Did you know… one in five small businesses will suffer a cyber breach this year? 81% of all breaches happen to small and medium sized businesses? To help boost awareness, we compiled a Cybersecurity Awareness Checklist with the 15 most effective tactics your security team should be doing to protect your company, your staff, and your clients’ data from a cyber-attack.
Today’s data breach epidemic is serious. Not a week goes by without another story in the news about another large data breach. Unfortunately, these breaches are becoming all too common and, in many instances, it seems there’s little you can do to prevent them. Luckily there are several things you can do to protect your specific accounts in order to limit the damage from these breaches and reduce the time to recover.
Most apps need to collect some personal information in order to function. For example, one needs to provide personal information if you want to use a dating app in order to get connected with the people you are interested in, but what is that personal information used for, who is it shared with, how is it protected and what happens to it when you stop using a given app or service?
It’s been a little over a year since the General Data Protection Regulation (GDPR) went into effect and like all one-year-olds, the first year can be a challenge. Let’s review what the GDPR is, walk through the results from the first year, and ensure you know the proper data security precautions for your business in order to comply….
The dark web is getting a lot of attention lately. Cybercriminals leverage the anonymous nature of the dark web to launch attacks on a company’s network and on individuals. The dark web is also a hiding place for loot stolen from these cyber attacks and is an exchange where criminals can sell their wares—i.e. your stolen data….
Since passwords are required for accessing nearly everything online today, it should be no surprise that 81% of hacking-related computer breaches leveraged either stolen and/or weak passwords. Find out if you are doing what is necessary to protect your data…
Want to know about the latest cybersecurity insights for your business?
The cybersecurity hits just keep on coming in 2020, with recent reports revealing ransomware attacks on mobile banking applications, international software companies, municipal governments,...Continue Reading >
To many of us, a software patch is nothing more than an irritation. When a pop-up window prompts us to install a patch—a set of...Continue Reading >
For the last three months, we’ve all been focused on the day-to-day details of our technology. Does one videoconferencing platform work better than another?...Continue Reading >