Are you tired of watching the news and seeing the latest privacy breach within your favorite social media sites? Are you tired of organizations mishandling of the data that you entrusted with them? Do you want to disappear from the Internet? Do you want to escape from your digital past? Do you know how? Continue reading “How to disappear from the Internet”
A new triple threat malware has arisen and is plaguing Android devices. This malware can place an overlay screen on top of your login screen and steal your login information.The malware is flawless in its attempts to masquerade as an legitimate app. Continue reading “MysteryBot Android trojan aims at banking apps”
What is the big difference anyway?
Information and cybersecurity is very similar as they are both designed to protect the organizational security posture. A well-defined security structure and policy can protect the organization in the event of a data breach and recovery.
Information security (InfoSec) is the strategies and methodologies designed to manage the processes, tools, and policies needed to protect the confidentiality, integrity, and availability of information systems and data. The CIA (confidentiality, integrity, and availability) has become the mandatory foundation for the protection and preservation of security of an organizations data. The components of CIA are: Continue reading “Cybersecurity versus Information Security”
Dangers of Dating Websites
Dating online is starting to be the norm for many busy professionals. No one seems to have the time to meet anyone organically anymore. Dating websites make it so easy and simple to find your one true love or whatever your temptation desires. All someone has to do is sign up on the site, upload a few pictures and answer a few questions. A person can complete the required startup information in the morning and have a slew of qualified dating candidates in the afternoon. Sounds to good to be true. However, there are several factors that one should consider when utilizing these sites.
Cybercrime can be defined as any criminal activity in which a computer (or networked device) is targeted and/or used. Some cybercrimes directly attack a computer or device in order to damage or disable it. Others make use of a computer to spread malware, illegal information, images or other materials. Cybercrimes often do both, for example […]
Everybody loves the modern conveniences of having a smart home and gadgets, but have you ever thought that it could be damaging to your health and personal safety? In the 21st century we now have the capability of walking in to our homes and telling our smart device to turn on the lights and TV for us. We can even tell our vehicle where we would like to go, and it takes us there. Honestly, the majority of people do not stop to think about the security implications that are associated with owning these devices. We just know that we have this device that is supposed to do A, B, and C to make my life easier and it should work. However, being ignorant about security is a no win situation. Below there are four easy steps that you can do to secure your smart devices:
Getting online and surfing the world wide web is cool and exciting as information is available to you and ready at a moment’s notice. It is getting easier and more convenient for everyone to take your favorite electronic devices along with them and hop on the Wi-Fi. As devices become smaller, thinner and more portable, it is also becoming the norm for business to offer free Wi-Fi. So, below I have constructed a short easy to remember checklist on how to keep your devices and information safe.