Press enter to search
May 8, 2017

Dissecting the Back-End Mechanics of a Hack

No specific hacker’s tools or resources are mentioned here for obvious reasons, but by taking the mystery out of what is essentially a simple process, the business owner can understand what they are up against and why trusting the big software security firms – or even investing in outsourced IT support – is a wise idea.

April 5, 2017

Overcoming online pitfalls: Improving safety and building trust through digital civility

“A More Perfect Internet: Digital Incivility, Cyber-Violence and Fake News” was the second program in a series led by the George Washington University Law School's Global Internet Freedom and Human Rights Project. The event brought together practitioners, academics and student-experts to identify, address and explore ways to combat online pitfalls like cyber-violence, hoaxes and misinformation.

April 3, 2017

5 Ways to Spot and Avoid Credit Card Skimming

In credit card skimming, a cybercriminal uses a malicious electronic device which ‘skims’ through your credit card data once the magnetic strip of your card is in contact with it and steals information from it in order to take control of your account. Learn basic safety measures that can help you avoid becoming a victim.