Cybercrime Can Make You Rich

Cybercrime Can Make You Rich

It’s no surprise that global spending on cybersecurity products and services is predicted to surpass $1 trillion over the next four years, according to Cybersecurity Ventures. After all, a massive problem needs a massive solution.

Cybersecurity Tips That are Cost-effective and Efficient

Cybersecurity Tips That are Cost-effective and Efficient

We know that the subject of cyber security can be daunting. We know it is discouraging to hear about all of the ongoing cyber crime. We know you want to do the right thing and we know you have a budget. Begin with these tips to ease you into a more cyber secure environment

Cybercrime: A Boundless Threat

Cybercrime: A Boundless Threat

Digital technology continues to transform and disrupt the world of business, exposing organisations to both opportunities and threats. So it’s hardly surprising that cybercrime continues to escalate – ranking as this year's second most reported economic crime.

How to Secure Your Email (And Why It Matters More Than You Think)

How to Secure Your Email (And Why It Matters More Than You Think)

"Furthermore, despite the historic focus of hackers on governments and corporations, their gaze is gradually shifting towards individuals."

Calling All Computer or Credit Card Users...

Calling All Computer or Credit Card Users...

Top cyber security expert offers up his best advice for online holiday shopping and year round caution. Get the answer to questions like: How do criminals get credit card and personal information? What's the first thing I should do when making an online purchase? 

Two-Factor Authentication: Who Has It and How to Set It Up

Two-Factor Authentication: Who Has It and How to Set It Up

This article...does 4 important things. 1. It states the obvious, that password only authentication is an extremely inadequate from of authentication; 2. It lists roughly 30 commonly used sites and accounts that offer two-step authentication; 3. It walks the reader through how to set up a two-step verification system on each of these accounts (including videos and screenshots); and 4. It discusses the inconvenience of security. 

10 Tips for Spotting a Phishing Email

10 Tips for Spotting a Phishing Email

By now, most of us have come across an email that had clear signs it was not legitimate. We know that phishing emails exist and we know better than to fall for them, right? 

What Steps Businesses Should Take In Order To Be GDPR Compliant

What Steps Businesses Should Take In Order To Be GDPR Compliant

"American companies are not exempt – GDPR applies to any business that processes consumer data belonging to EU residents, even if the company is outside the EU and even if the data is collected, stored, secured, and processed outside of outside of the EU."

4 Experts' Tips For Improving Your Small Business Cyber Security

4 Experts' Tips For Improving Your Small Business Cyber Security

How’s your cybersecurity these days? If you’re like most small businesses, it’s probably not that great.

In fact, recent statistics show that fewer than one-fifth of small businesses report their cybersecurity as highly effective. That’s a problem, given that over half of respondents say their small business has undergone a cyberattack or a data breach in the past year.

I am Cyber Cautious... But What About My Children?

I am Cyber Cautious... But What About My Children?

What can you do to avoid an infected computer at home when you have kids around?  You might know you shouldn't click that questionable link in that email to avoid negative consequences but how can you be so sure your child is exercising the same level of caution? Well, you can't be.

Please Don't Send Me to Cybersecurity Training!

Please Don't Send Me to Cybersecurity Training!

Cyber education is needed more than ever before. The key difference now is that there are interesting, engaging and unique avenues to educate!

Third Party Vendors Leave Your Network Open to Attacks- What Can You Do About It?

Third Party Vendors Leave Your Network Open to Attacks-  What Can You Do About It?

“The increased reliance on third-party employees, coupled with the growing sophistication of hackers, has led to the current identity and access management crisis that most businesses are faced with today — whether they realize it or not.”

6 Important Cyber Security Tips for Small Business Owners From The Ame Group

6 Important Cyber Security Tips for Small Business Owners From The Ame Group

Small businesses are the most depended on, the most at risk, and the least protected. Unfortunately, 60% of businesses close their doors within 6 months of a breach and we can't let that happen. Find out what simple steps you can start taking today.

Safety Tips For Mobile Devices

Safety Tips For Mobile Devices

Your mobile devices – including smartphones, laptops and tablets – are always within reach everywhere you go, whether for work, travel or entertainment. These devices make it easy to connect to the world around you, but they can also pack a lot of info about you and your friends and family, like your contacts, photos, videos, location and health and financial data. It’s important to use your mobile device safely.

Top Ten: The Most Important Cyber Security Tips for Your Users According to Cisco

Top Ten: The Most Important Cyber Security Tips for Your Users According to Cisco

No matter how effective—or expensive—the security tools protecting your network are, there’s no way to predict the damage caused by a single careless user. The war against cyber criminals is fought each time a user decides to click an unfamiliar link or open an attachment—and just a single mistake could be the reason for massive data loss.

Password Panic- How to Better Secure Yourself

Password Panic- How to Better Secure Yourself

Do you use the same password for multiple accounts? A recent report from TeleSign shows roughly 3 out of 4 of us do so AND have not changed said passwords in over 5 years.  It should not come a shock, then, to learn that around 40% of people polled have had a “security incident” in the past year (meaning an account was hacked, a password was stolen, or personal information was compromised).