News
Does the Upcoming CCPA Law Affect You?
Reports of data breaches in the news have become so common, it seems we hardly notice anymore. Just in the first few months of 2019, there have been over 50 high profile data breaches in the United States alone. Some of these breaches struck major companies such as...
April Cybersecurity News Round-Up
Security Flaw in Internet Explorer Puts Users at Risk An unpatched exploit in Internet Explorer’s handling of MHT files is putting its users at risk. Hackers are using this flaw to their advantage by spying on Windows users to steal their information. Unfortunately,...
Laptops More Vulnerable to Hacking According to Recent Research
In recent years, laptops have become a staple among young professionals and students. Walk into a Starbucks on any given weekday and there’s a high probability you’ll see at least a half dozen people drinking coffee and working on their laptops. But new research has...
March Cybersecurity News Round-Up
New Phishing Attack Targets Facebook Users Hackers are becoming more and more creative every day. There is now a way for them to access your Facebook login credentials with little effort. Victims are lead to malicious websites that mimic real websites, such as Airbnb,...
The Role of Management in Cybersecurity Risk
Cybersecurity has traditionally been the realm of the IT department. But those in IT have long championed the fact that keeping a company cyber secure is really everyone’s job. And they are right. Anyone with their guard down within an organization can potentially...
Insecure License Plate Readers Could be Exposing the Data of Millions of Drivers
In a world that heavily relies on technology, the threat of a malicious cyber attack is always on the table; and it's not just individual citizens who are at risk. According to Forrester, 95% of breached records came from three core industries: government, retail, and...
Hacking Drones: The Cybersecurity Risks You Need To Know
In the past few years, there has been a huge surge in the sales and use of drones. Also known as unmanned aerial systems (UASs), these devices are much more complex and sophisticated than the older remote-controlled planes or helicopters that people could buy at Radio...
Nest Cam Hoax Highlights Need for Stronger Passwords
Try to imagine this situation: You’re sitting at home when suddenly you hear loud sirens and alarms blaring through your house. Your home security camera then alerts you that North Korea has launched a nuclear strike against the U.S. and that everyone in your area had...
8 Top Privacy Tips for Mobile Devices and Passwords
For years, people have been told the importance of keeping anti-virus software on their PCs. The need to keep these regularly updated so that you don’t accidentally get infected with malware has been impressed upon us. But this ignores one of the newest problem areas...
5 Best Tips for Securing Your Email and Browsers
For years now, we’ve heard about the dangers of computer hacks and security breaches. People have been warned about not clicking on unsolicited or unusual emails and never clicking on suspicious links. But still, the behaviors continue with people infecting their home...