Safer Internet Day: Practice Safe Online Habits

By | February 7th, 2013|Uncategorized|

This Tuesday was Safer Internet Day – a day dedicated to honoring safe Internet habits. In the past year, we’ve seen our fair share of data breaches in the news, so it’s important to be aware of your online habits, and what you’re doing to protect yourself and your business. So what better way to [...]

Security Insights: Protecting Your Business in 2013

By | January 14th, 2013|Uncategorized|

Knowing the emerging and continuing trends of threats in cybersecurity gives us an idea of where to start improving for the new year. Cyber criminals historically have followed the trends of the majority of the cyber community. Their goal is to negatively impact as many individuals and corporations as possible. With that said, it is [...]

A Year in Review: The Top Identity and Security Stories of 2012

By | December 20th, 2012|Uncategorized|

Another year has come and gone and what a year it was! Experian looks back at the top five identity and security stories of 2012.Number 5: Anonymous claims it hacked PayPal, PayPal denies itOn its Twitter account, Anonymous claimed to have more than 28,000 passwords from PayPal, but the online purchasing store verified that the [...]

Mobile Apps: Protect Your Children’s Privacy and Identity

By | December 12th, 2012|Uncategorized|

This week the FTC released an alarming reporton mobile apps, announcing that hundreds of popular smartphone and tablet apps aimed at children are collecting personal data and sharing without proper disclosure to parents. Of the 400 apps surveyed from Apple’s App Store and the Google Play Store for Android, 60 percent sent the devices’ ID [...]

Tis the Season: Security Tips for Online Holiday Shopping

By | December 5th, 2012|Uncategorized|

It’s that time of year again! As you finish your holiday décor and put your gifts under the tree, make sure you stay safe while shopping for your loved ones online this season with these quick tips.Make sure your devices are up-to-date. Any device you use for shopping; including smartphones, tablets and computers; should have [...]

Malware Threats to be Aware of in 2013

By | November 29th, 2012|Uncategorized|

As we mentioned in our last blog post, malware is surging. According to McAfee, mobile malware grew two-fold last quarter, and Kaspersky found that there has been rapid growth in the number of malware programs targeting Android devices specifically. Most notably, McAfee says there was a 23% increase in new types of malware last quarter [...]

Security Insights: Securing Mobile Devices and Applications

By | November 7th, 2012|Uncategorized|

This year has shown just the start of threats to mobile devices and the applications that run on them. Employees and individuals are moving primarily to mobile devices and applications for most of their daily computing needs. Cybercriminals are very aware of this trend in mobile devices and applications and have been putting more and [...]

Exchange Your PIN for Your Iris

By | October 31st, 2012|Uncategorized|

It's something you see in cartoons and science fiction movies – a character goes into a secured area and either their hand or eye is scanned to grant them access. In real life, that practice is called biometrics, or the use of personal traits such as fingerprints, hand scans, eye scans or vocal patterns to [...]

Scary Security – Is Your Password, “Password”?

By | October 25th, 2012|Uncategorized|

“Password” is holding its number one spot as the least secure password for another year in a row. Pretty spooky considering Halloween is just around the corner. SplashData just released its annual list of the most common passwords used on the Internet and posted by hackers.Here’s a quick list of the top 20 “Worst Passwords [...]

Security Insights: Cybersecurity Emerging Trends and Threats

By | October 12th, 2012|Uncategorized|

In the name of cybersecurity threats, 2012 has pretty much followed every pre-written article in 2011. The future of threats continues to develop and has become a hot security issue.Existing and Emerging Trends and ThreatsThe Multi-State Information Sharing & Analysis Center has rounded up the cybersecurity threat landscape, highlighting the challenges to come within the [...]

Load More Posts