Today, many vehicles on the road are wheeled, portable computers. Estimates suggest that new vehicles rolling off the assembly line have between 1,300 and 3,000 microchips inside. Some cars now even connect to the internet, which makes streaming music easy but opens the possibility for cyber threats. Cars have joined the Internet of Things, and…
We’ll explore how incognito mode works, how it can help protect your browsing data, and, importantly, ways it isn’t a magic solution to all your privacy concerns.
For many of us online, social media has become a daily window to the world. It is how we communicate with friends and family (and remember their birthdays). For some of us, it is an integral part of our business.
That off-brand calculator or calendar app you don’t remember downloading might be snooping on you. Even though the use of stalkerware to spy on adults is against the law, these duplicitous bits of code still pop up on app stores. An abusive ex or stalker might use stalkerware to monitor their victims’ private lives. Because…
When it comes to fostering a culture of cybersecurity at your organization, sometimes it’s best to start with creating awareness of some basic behavior changes. The truth is that even though the threats might change, advice regarding mitigation in many ways stays the same. If we all put a premium on adopting these behaviors, we…
To learn new behaviors, though, you will first need to “unlearn” some misconceptions. Here are the top eight small business cybersecurity misconceptions…and how your outfit can overcome them.
We are excited to announce a new series of conversations about how to keep your data private and safe! Join us this Data Privacy Week for Talking Data. Each day, we will be hosting 30-minute conversations with industry leaders to discuss all things data privacy!
While it has a bland name, Business Email Compromise (BEC) refers to a specific, nasty type of cyberattack that targets businesses of all sizes. This sophisticated hack targets email communication within organizations. When successful, BEC can lead to financial losses, reputational damage, and compromised sensitive information.
You’ve seen the headlines about ransomware and corporate shutdowns due to cyberattacks, and the unfortunate truth is that these threats are becoming more widespread. Technology has spurred unprecedented economic growth for investors. However, we believe investors have a duty to push companies to follow best practices and be proactive in their security. It’s a good…