Earlier this year, we talked about the issues in cyber security that we anticipated to dominate in 2016. One of which was the prediction that Apple devices would become the victim of increased focus from cyber criminals as they grow in popularity. Once seemingly impossible to penetrate, we’re already seeing a number of attacks against […]
We saw how a mobile app can become a global sensation across the global with the launch of Pokemon Go. As mobile activity and the number of apps increase, it’s important to take precautions to ensure the security of our devices. Here are some tips for accessing the apps on your phone safely.
Say Yes to […]
In the first half of 2016 alone, there were 500 breaches with over 12.8 million records exposed, according to the Identity Theft Resource Center. With cyber attacks and data breaches becoming a statistical certainty in today’s digital world; the number of cybersecurity professionals has grown in tandem. However, there are not enough qualified professionals to […]
Let’s start with the basics: What is the dark web? The dark web is inaccessible through standard web browsers. These dark web sites use tools like Tor and I2P to hide their IP address. Here, it is not uncommon for cyber criminals to sell your personal information for a profit.
So what’s the going rate for […]
The use of mobile devices is increasingly present in the wedding planning process. Brides are using their smartphones as a tool to work with vendors, manage their registry, reserve hotel blocks and more. With technology taking over this process, it’s important that privacy and security is still top of mind.
The National Cybersecurity Alliance and STOP.THINK.CONNECT recently […]
Earlier this month, Niantic launched Pokémon Go – a location-based augmented reality game you can play via your mobile device – available to both iOS and Android users. The app was a sensation across the globe with 26 million users in the U.S. alone!
And, as the hype continues, it’s important for users to think about […]
We’ve talked about tax identity theft in the past, however, IRS imposter scams are a bit different. Imposters go to great lengths to manipulate their victims, and there appears to be no slowing for this type of crime. Here are some things to look out for to recognize these scams.
What is an imposter scam?
July 1st marks the halfway point of the year. What better time to review the last six months of 2016? The Identity Theft Resource Center reports 500 breaches with over 12.8 million records exposed since January 1, 2016. The breaches span the verticals of financial services, business, education, government/military, and government/healthcare. At this rate, we may […]