Aligning Cybersecurity with Workplace Culture

Aligning Cybersecurity with Workplace Culture

Building a cybersecurity culture is the responsibility of every employee, manager and contractor to mitigate cyber threats. Many organizations are already working toward making a security cultural shift because they recognize that they must face security risks collectively, and that can only happen with a solid security culture foundation.

Why a Child’s Identity and ID Information is the #1 Target for Some Cybercriminals 

Why a Child’s Identity and ID Information is the #1 Target for Some Cybercriminals 

As reported in a study by Carnegie Mellon University, children were 51 times more likely than adults to be victims of identity theft…

Hands off my data! 15 more default privacy settings you should change on your TV, cellphone plan, LinkedIn and more.

Hands off my data! 15 more default privacy settings you should change on your TV, cellphone plan, LinkedIn and more.

It’s not just Google and Facebook that are spying on you.

Thirteen Tips to Achieve Great CyberSecurity Without Spending a Fortune

Thirteen Tips to Achieve Great CyberSecurity Without Spending a Fortune

With the new dynamics at play it is increasingly important for small business owners, entrepreneurs considering starting a business, and people in general to cyber-protect themselves.

“An ounce of prevention is worth a pound of cure.”

“An ounce of prevention is worth a pound of cure.”

Out of nearly 160,000 reported cyber incidents affecting businesses in 2017, 93 percent could have been prevented by following basic security measures such as regularly updating software, blocking fake email messages, using email authentication, and training employees, a new report claims.

Cybercrime Can Make You Rich

Cybercrime Can Make You Rich

It’s no surprise that global spending on cybersecurity products and services is predicted to surpass $1 trillion over the next four years, according to Cybersecurity Ventures. After all, a massive problem needs a massive solution.

Cybersecurity Tips That are Cost-effective and Efficient

Cybersecurity Tips That are Cost-effective and Efficient

We know that the subject of cyber security can be daunting. We know it is discouraging to hear about all of the ongoing cyber crime. We know you want to do the right thing and we know you have a budget. Begin with these tips to ease you into a more cyber secure environment

Cybercrime: A Boundless Threat

Cybercrime: A Boundless Threat

Digital technology continues to transform and disrupt the world of business, exposing organisations to both opportunities and threats. So it’s hardly surprising that cybercrime continues to escalate – ranking as this year's second most reported economic crime.

How to Secure Your Email (And Why It Matters More Than You Think)

How to Secure Your Email (And Why It Matters More Than You Think)

"Furthermore, despite the historic focus of hackers on governments and corporations, their gaze is gradually shifting towards individuals."

Calling All Computer or Credit Card Users...

Calling All Computer or Credit Card Users...

Top cyber security expert offers up his best advice for online holiday shopping and year round caution. Get the answer to questions like: How do criminals get credit card and personal information? What's the first thing I should do when making an online purchase? 

Two-Factor Authentication: Who Has It and How to Set It Up

Two-Factor Authentication: Who Has It and How to Set It Up

This article...does 4 important things. 1. It states the obvious, that password only authentication is an extremely inadequate from of authentication; 2. It lists roughly 30 commonly used sites and accounts that offer two-step authentication; 3. It walks the reader through how to set up a two-step verification system on each of these accounts (including videos and screenshots); and 4. It discusses the inconvenience of security. 

10 Tips for Spotting a Phishing Email

10 Tips for Spotting a Phishing Email

By now, most of us have come across an email that had clear signs it was not legitimate. We know that phishing emails exist and we know better than to fall for them, right? 

What Steps Businesses Should Take In Order To Be GDPR Compliant

What Steps Businesses Should Take In Order To Be GDPR Compliant

"American companies are not exempt – GDPR applies to any business that processes consumer data belonging to EU residents, even if the company is outside the EU and even if the data is collected, stored, secured, and processed outside of outside of the EU."

4 Experts' Tips For Improving Your Small Business Cyber Security

4 Experts' Tips For Improving Your Small Business Cyber Security

How’s your cybersecurity these days? If you’re like most small businesses, it’s probably not that great.

In fact, recent statistics show that fewer than one-fifth of small businesses report their cybersecurity as highly effective. That’s a problem, given that over half of respondents say their small business has undergone a cyberattack or a data breach in the past year.

I am Cyber Cautious... But What About My Children?

I am Cyber Cautious... But What About My Children?

What can you do to avoid an infected computer at home when you have kids around?  You might know you shouldn't click that questionable link in that email to avoid negative consequences but how can you be so sure your child is exercising the same level of caution? Well, you can't be.

Please Don't Send Me to Cybersecurity Training!

Please Don't Send Me to Cybersecurity Training!

Cyber education is needed more than ever before. The key difference now is that there are interesting, engaging and unique avenues to educate!

Third Party Vendors Leave Your Network Open to Attacks- What Can You Do About It?

Third Party Vendors Leave Your Network Open to Attacks-  What Can You Do About It?

“The increased reliance on third-party employees, coupled with the growing sophistication of hackers, has led to the current identity and access management crisis that most businesses are faced with today — whether they realize it or not.”