3 Easy Ways to Protect Yourself from Cyber Crime on Cyber Monday

Cyber Monday is a happy hunting ground for hackers. Protect yourself from cyber crime next shopping season with these three simple steps. Cyber Monday is big business. In 2015, total digital sales that day topped $3 billion, going down in the record books as the heaviest online spending day in history. That’s up 12 percent from 2014. However, buyers must [...]

2017-01-06T15:55:49+00:00Categories: Cybersecurity, Financial, News|Tags: , , , , |Comments Off on 3 Easy Ways to Protect Yourself from Cyber Crime on Cyber Monday

Hillary vs. Donald: Cyber Security and the President-Elect

    Cyber security has been at the forefront of the U.S. presidential campaign. Not only has Hillary Clinton been in the hot seat for using an unsecured private email server during her time as Secretary of State, her campaign has been the victim of a series of email hacks from WikiLeaks. There have also been concerns [...]

2017-11-07T14:38:16+00:00Categories: Cybersecurity, Government, News|Tags: , , , , , , |Comments Off on Hillary vs. Donald: Cyber Security and the President-Elect

Information Security Challenges and Presidential Politics

In recent years information security challenges have dominated headlines as hacking incidents at companies – such as Home Depot, Target and Anthem – become more prevalent. But 2016 seems to be the year of the political hack. A lack of information security can prove to be debilitating to even the most savvy political campaigns, as career politicians [...]

2016-12-16T16:14:05+00:00Categories: Cybersecurity, Government, News|Tags: , , , , , , |Comments Off on Information Security Challenges and Presidential Politics

Top Cyber Security Threats That Hackers Love

Cyber security threats are becoming all to common and with each passing day, malicious hackers become smarter and more agile in their tactics. You don’t have to look far these days to find cyber security news of hackers, cyber criminals and other hostile agents successfully compromising computer networks and breeching data systems for their own [...]

2017-06-05T18:01:20+00:00Categories: Cybersecurity, News|Tags: , , , , , , , |Comments Off on Top Cyber Security Threats That Hackers Love

A Cyber Security Trick: Don’t Fall Victim This Halloween

Halloween may be the one night in the year when ghouls, ghosts and goblins routinely roam the streets, but in the brave new online world a litany of cyber security threats  are constantly lurking just beneath the surface. A cyber security trick is certainly not a treat, and something no one wants to fall victim to [...]

2018-07-19T22:52:10+00:00Categories: Cybersecurity, News|Comments Off on A Cyber Security Trick: Don’t Fall Victim This Halloween

The Watch List: Everyday Cyber Security Threats

You don’t have to look far these days to find cyber security news of hackers, cyber criminals and other hostile agents successfully compromising computer networks and systems for their own benefit. Here's a look at some of the more common cyber security threats and how smart cyber security professionals counteract them to protect the organizations, users and [...]

What You Need to Know: Risks of Cloud Services

Cyber crime costs the average U.S. company $15.4 million each year. Despite this, many companies are still lagging when it comes to protecting their data and cloud applications from cyber security threats including cloud cyber security threats. Organizations of all kinds have been eager to introduce and explore the benefits of cloud computing and storage. These [...]

2018-08-15T02:43:10+00:00Categories: Cybersecurity, News|Tags: , , , , , |Comments Off on What You Need to Know: Risks of Cloud Services

Tesla Motors Not Immune to Devious Hackers

Tesla Motors, known for wrapping their innovative long range battery technology in an attractive future-car shell, has recently become the victim/beneficiary of some white-hat hackers who displayed their research at the Def Con hacker conference in early August. Researchers presented their findings surrounding vulnerabilities that remain in Tesla’s sophisticated sensors which the vehicles utilize for [...]

2016-10-24T13:31:27+00:00Categories: Cybersecurity, News|0 Comments

The Feds Aren’t the Only Ones in the Warrantless Wiretapping Game

The modern world is exploding with new technologies that have the potential to radically alter human life on this planet both for the better and the worse. The burgeoning of surveillance technology has already begun to become pervasive in the public and private sectors, ranging from the rampant police department misuse of telephone eavesdropping devices [...]