Data Security: Are You Utilizing Basic Security Precautions?

Posted on 2/27/2014 by Mikayla Jenkins in security tech trends

Target Corp. Neiman Marcus Group. Michaels Stores Inc. Lately, it seems like retailer data security breaches are dominating the headlines. But many data security breaches don’t make national headlines.

read more..

Infographic: Importance of Disaster Preparedness

Posted on 8/2/2013 by Mikayla Jenkins in security tech trends Disaster recovery data center virtualization

Overlooking the importance of having a disaster recovery plan in place for your business can lead to costly IT outages. The term “Disaster Preparedness” may bring to mind the necessity of taking steps to protect your business from the threat of natural disasters, but the majority of onsite disasters are due to human error.

read more..

What the Living Social Password Breach Means to You

Posted on 6/5/2013 by Mikayla Jenkins in security tech trends

Are you guilty of one of the worst bad technology habits possible? Do you use the exact same password and login name for a multitude of online sites? If so, you could be putting yourself at considerable risk. Clever hackers might be able to crack your password. And when they do, what's to stop them from using that password to get into all of your favorite online sites - including, potentially, your online bank - while pretending to be you?

read more..

Take the Small Steps to Protect Your Business from Cyber Attack

Posted on 5/29/2013 by Mikayla Jenkins in security tech trends small business

Here's what attracts cyber criminals: easy targets. This means that you can leave your small business exposed to a cyber attack if you don't defend your company's Wi-Fi systems with passwords, or if you trust in passwords which are absurdly easy to guess.

read more..

Protect Yourself with Two-Factor Authentication

Posted on 5/22/2013 by Mikayla Jenkins in security tech trends

Think your business's computers are protected with conventional passwords? Guess again. Too many of your staff count on simple passwords that are easy for hackers to figure out. Others use the same password for multiple Web sites, computers and mobile devices. Consequently once cyber criminals hack that password, they are able to easily gain access to numerous other sites and devices.

read more..

Would the AP Phishing Scam Have Tricked You?

Posted on 5/17/2013 by Mikayla Jenkins in security tech trends

You would never open a phishing e-mail that asks you to deposit $1,000 to obtain $1 million, would you? And you would never open anything from a Nigerian prince trying to get the cash he needs to flee to the United States, right? But what about the most subtle of today's phishing e-mails? Think you would never be seduced by one of them? Think again.

read more..

Is Your Phone's Passcode Really Safe?

Posted on 5/8/2013 by Mikayla Jenkins in security tech trends

Think your smart phone is protected simply because you make use of a passcode to stop others from logging onto its home screen? You better think again.

read more..

Is Privacy Dead? It Doesn't have to be

Posted on 5/1/2013 by Mikayla Jenkins in security tech trends

Do you have nightmares of your tablet falling into the hands of thieves? Maybe you worry that a hacker will break into your online bank account. These fears are warranted. It's increasingly challenging for all of us to guard our privacy in today's Internet age. But, there's good news.

read more..

How to Erase All Those Saved Passwords

Posted on 4/19/2013 by Mikayla Jenkins in security

We all save passwords and usernames on our web browsers. It's a way to quickly access the membership-based Web sites that we visit daily. Nevertheless, there's a security risk to this. If someone takes your laptop, this thief will have little trouble accessing your favorite sites. And if you've saved the password and username combination for your online bank account, then you might be in some very serious trouble.

read more..

Is the U.S. Government Making the Web More Dangerous?

Posted on 4/9/2013 by Mikayla Jenkins in security tech trends

Remember Stuxnet? Back in 2010, a new piece of malware corrupted multiple systems needed to access and control industrial equipment being used in Iran's nuclear program. The details of this malware remain fuzzy, but, as a recent story by the MIT Technology Review reports, Stuxnet is widely thought to be the work of the United States and Israeli governments. This makes Stuxnet particularly important: As the Technology Review story says, Stuxnet is among the most visible signs of a new form of warfare: government-controlled malware developed to attack the computers and security systems of other countries. And, like it or not, it appears that the United States is at the forefront of this phenomenon.

read more..

Subscribe via Email!

Receive a daily digest of new blog posts. 


Enter your email address: