Hopefully everyone who can work remotely is now working remotely due to government-mandated social distancing and stay-at-home advisories for COVID-19. Whether you’re a novice at working from home or a seasoned veteran, you will likely be affected by these at home privacy concerns, IT-related service impacts, and the latest Coronavirus cyber scams. Here’s what you should do to make your work at home experience as productive and secure as possible.
Phishing continues to be a huge security problem for everyone. While more than half of US organizations were successfully compromised by ransomware and phishing attacks last year according to Proofpoint, it also reported 90 percent of global organizations were targeted by business email compromise and spear phishing attacks. This ever-growing privacy risk affects home users, schools, businesses of all sizes, towns and even cities. The reality is that phishing threats are not going away any time soon.
Every year privacy and security practitioners mark Data Privacy Day. This unique day falls on January 28 every year and is touted as “an international effort to create awareness about the importance of respecting privacy, safeguarding data and enabling trust.” You’re probably thinking to yourself, well that sounds great but what does that mean to me and my company?
No matter which holidays you celebrate, you want to enjoy them with friends and family. You also want to make sure you protect yourself from online scams and theft. More and more shoppers choose to do online holiday shopping rather visit brick and mortar stores. The National Retail Federation forecast that online sales are expected to grow between 11% and 14% for the 2019 holiday season, compared with 2018.
Navigating the world of cybersecurity can be overwhelming. Any wonder why the percentage of U.S. employees who lack a basic understanding of cybersecurity best practices is estimated to be 70%? One thing remains certain. No matter how large or small – any business (or employee) that thinks they are not at risk for a cyber attack is only fooling themselves.
October is Cybersecurity Awareness Month. Did you know… one in five small businesses will suffer a cyber breach this year? 81% of all breaches happen to small and medium sized businesses? To help boost awareness, we compiled a Cybersecurity Awareness Checklist with the 15 most effective tactics your security team should be doing to protect your company, your staff, and your clients’ data from a cyber-attack.
Today’s data breach epidemic is serious. Not a week goes by without another story in the news about another large data breach. Unfortunately, these breaches are becoming all too common and, in many instances, it seems there’s little you can do to prevent them. Luckily there are several things you can do to protect your specific accounts in order to limit the damage from these breaches and reduce the time to recover.
Most apps need to collect some personal information in order to function. For example, one needs to provide personal information if you want to use a dating app in order to get connected with the people you are interested in, but what is that personal information used for, who is it shared with, how is it protected and what happens to it when you stop using a given app or service?
It’s been a little over a year since the General Data Protection Regulation (GDPR) went into effect and like all one-year-olds, the first year can be a challenge. Let’s review what the GDPR is, walk through the results from the first year, and ensure you know the proper data security precautions for your business in order to comply….
The dark web is getting a lot of attention lately. Cybercriminals leverage the anonymous nature of the dark web to launch attacks on a company’s network and on individuals. The dark web is also a hiding place for loot stolen from these cyber attacks and is an exchange where criminals can sell their wares—i.e. your stolen data….
Since passwords are required for accessing nearly everything online today, it should be no surprise that 81% of hacking-related computer breaches leveraged either stolen and/or weak passwords. Find out if you are doing what is necessary to protect your data…
Want to know about the latest cybersecurity insights for your business?