cyber aware

Why a Child’s Identity and ID Information is the #1 Target for Some Cybercriminals 

Why a Child’s Identity and ID Information is the #1 Target for Some Cybercriminals 

As reported in a study by Carnegie Mellon University, children were 51 times more likely than adults to be victims of identity theft…

Cybercrime: A Boundless Threat

Cybercrime: A Boundless Threat

Digital technology continues to transform and disrupt the world of business, exposing organisations to both opportunities and threats. So it’s hardly surprising that cybercrime continues to escalate – ranking as this year's second most reported economic crime.

Calling All Computer or Credit Card Users...

Calling All Computer or Credit Card Users...

Top cyber security expert offers up his best advice for online holiday shopping and year round caution. Get the answer to questions like: How do criminals get credit card and personal information? What's the first thing I should do when making an online purchase? 

Two-Factor Authentication: Who Has It and How to Set It Up

Two-Factor Authentication: Who Has It and How to Set It Up

This article...does 4 important things. 1. It states the obvious, that password only authentication is an extremely inadequate from of authentication; 2. It lists roughly 30 commonly used sites and accounts that offer two-step authentication; 3. It walks the reader through how to set up a two-step verification system on each of these accounts (including videos and screenshots); and 4. It discusses the inconvenience of security.