October is National Cyber Security Awareness Month

October is National Cyber Security Awareness Month (NCSAM), created as a collaborative effort between government and industries to ensure everyone has the resources they need to say safe online. While it’s important to keep cyber security top-of-mind throughout the year, NCSAM provides a dedicated time for companies, government agencies, universities, nonprofits, individuals and more to […]

Read More →

5 Security Tips for Working Remotely

According to Global Workplace Analytics’ 2016 study, 3.7 million employees now work from home at least half the time. In fact, the amount of individuals who work from home has grown 103% since 2005. While working from home brings a number of benefits, like cutting out the long commute to work, providing a quieter atmosphere […]

Read More →

Back to School Cybersecurity Tips for all Ages

Children are lucrative targets for identity theft because of their clean credit. In a report by Carnegie Mellon CyLab, 10.2 percent of children had someone else using their Social Security number (SSN). Identity thieves can cause serious damage to a child’s credit with the use of a single identifying element: SSN. A child’s SSN can […]

Read More →

The Once Impenetrable, Penetrable: Macs Under Attack

Earlier this year, we talked about the issues in cyber security that we anticipated to dominate in 2016. One of which was the prediction that Apple devices would become the victim of increased focus from cyber criminals as they grow in popularity. Once seemingly impossible to penetrate, we’re already seeing a number of attacks against […]

Read More →

The Growing Talent Gap in Cybersecurity

In the first half of 2016 alone, there were 500 breaches with over 12.8 million records exposed, according to the Identity Theft Resource Center. With cyber attacks and data breaches becoming a statistical certainty in today’s digital world; the number of cybersecurity professionals has grown in tandem. However, there are not enough qualified professionals to […]

Read More →

How much is your Uber account worth on the dark web?

Let’s start with the basics: What is the dark web? The dark web is inaccessible through standard web browsers. These dark web sites use tools like Tor and I2P to hide their IP address. Here, it is not uncommon for cyber criminals to sell your personal information for a profit. So what’s the going rate […]

Read More →

Pokémon Go Privacy: How to Stay Safe While Using the App

Earlier this month, Niantic launched Pokémon Go – a location-based augmented reality game you can play via your mobile device – available to both iOS and Android users. The app was a sensation across the globe with 26 million users in the U.S. alone! And, as the hype continues, it’s important for users to think […]

Read More →

The State of Cybersecurity in 2016 Thus Far

July 1st marks the halfway point of the year. What better time to review the last six months of 2016? The Identity Theft Resource Center reports 500 breaches with over 12.8 million records exposed since January 1, 2016. The breaches span the verticals of financial services, business, education, government/military, and government/healthcare. At this rate, we may […]

Read More →

When a hack, is not a hack

TechCrunch reported last week that the streaming music service Spotify suffered a security breach. A list containing hundreds of account credentials, including emails, usernames, passwords and other account details, appeared on the website Pastebin on April 23. If you’re a Spotify user, you will likely want to change your password. Some Spotify users noticed suspicious […]

Read More →

News Recap: White Hat Hackers Crack Fingerprint Authentication on Phones

Fingerprint authentication on smartphones is meant to bridge the gap between security and convenience. The problem is, we leave our fingerprints everywhere – on our coffee cups, keypads, and beyond. And, hackers are constantly looking for new, innovative ways to steal our most sensitive information – fingerprints included. In a recent Naked Security article, white […]

Read More →