Category: Security

Hardware Store Keys

Information Security Risk from a Small Business Perspective

 |   |  Security

I have been reading more and more about the dangers of cyberattacks and their costly impact to business, but the thing that stuck out to me was the profound impact on small businesses. Small businesses are increasingly a target for attack, and so many are unprepared.

Read More >

Abstracted code on laptop screen

Online Privacy is a Joke

 |   |  Security

Yes, I understand the business model that many social media and online commerce firms use, and I diligently try to protect myself with privacy tools such as Ghostly, but it’s not enough. Stored information about our every online move is used to target us – and in some cases used in ways that would destroy our trust.

Read More >

Escalators in Shopping Mall

Seeing Red on Black Friday

 |   |  Security

Losing a few dollars on your debit card (and going through the hassle of locking your accounts down to prevent more widespread damage) pales in comparison to what happens during a data breach at an organizational level, but it’s still a scary first look at what can happen when your data, personal or otherwise, goes unprotected.

Read More >

Fishing Line on net with tackle box

Don’t Let This Phishing Technique Lure You In

 |   |  Security

“Dear Sir/Madam!” Surely this isn’t spam. They must be a legitimate business contact, how else would they have known my preferred greeting was Sir-slash-Madam? If all phishing and fraudulent emails were this poorly done, it would indubitably be easier to tell the real from the fake. Sadly, they don’t all share this obvious level of quality.

Read More >

Business Executive

It’s 10:00 PM, Do You Know Where Your CEO Is?

 |   |  Security

“CEO Fraud,” as it is called, has become one of the fastest growing Internet scams in recent memory. According to an FBI report, American companies have lost almost $750 million dollars to the scams from October 2013 and August 2015.

Read More >

Gate with Chain

Abandon all hope…

 |   |  Security

“Abandon all hope, ye who enter here” is the inscription on the gates to enter Hell, according to Dante’s Inferno. Have we gotten to the same point when using the Internet?

Read More >

Email At Sign

Why Email Breaches Are a Big Deal

 |   |  Security

As we’ve been discussing this issue, some people have asked “Why is this such a big deal? So what if your email address gets out there?” Why? It comes down to two things.

Read More >

Microsoft Error Blue Screen

Fake Microsoft Security Support Scam

 |   |  Security

As amusing as the experience was for me, the lesson I’m sharing today is a serious one. After I hung up the phone, I couldn’t help to think of what would have happened if my mother (or any other family member for that matter) received this phone call.

Read More >