top of page
Uncompromising Security + $1M Ransomware Protection Guarantee - [Get Protected Today]
Search


Sextortion is a Serious Crime
Sextortion is a serious crime that occurs when someone threatens to expose/post sensitive images or videos of their victims, often as a...
Jul 22, 2022


Cookies and You
What are cookies? Cookies are small files which contain pieces of data that are used to identify your computer when you are on a network....
Jun 27, 2022


Has your Mobile Device been Hacked?
Since people are on their phones all the time it is easy to detect a change in its normal functions. Whether it’s a change in the way...
Jun 21, 2022


Working from Home? Here's why Awareness is a Priority
Living through the pandemic has driven shifts in the way people socialize, eat, and work. Businesses worldwide were forced to shut down...
May 3, 2022


Credit Card Theft
In about a decade, the popularity of using plastic cards as a form of payment has risen; it is now more uncommon to find someone paying...
Apr 21, 2022


Cyber War - Anonymous and The Russian Invasion of Ukraine
In a recent turn of events, the Russian invasion of Ukraine has been in full development. Although the tension has been building up for a...
Mar 15, 2022


Stop using "Free" Wi-Fi!
Wi-Fi is everyone’s best friend when you want to watch videos or download things on your mobile devices. The internet speed of a mobile...
Jan 24, 2022


Botnets
Botnet is used to refer to a collection of computers linked together to automate tasks. Generally, botnets themselves are not a threat to...
Jan 18, 2022


Metadata is a treasure trove.
When using your computer, there is a lot of data created beyond what is normally accessed by individuals. Such information can include...
Dec 15, 2021


Deepfake...the Good, the Bad, the Ugly
What if someone could fake your identity, not on paper with a fake I.D., but on a video as if you would’ve taken a video yourself? That...
Nov 19, 2021


The Human Element
The Human Element is one of the most valuable assets of any organization. In business, people are considered resources because they are...
Oct 25, 2021


Protect your Facebook profile. Your Privacy depends on it.
Have any of your social media accounts been hacked in the past? A good majority of internet users have experienced some form of data...
Oct 25, 2021


Could Your Business Partner Get You Hacked?
A supply chain attack is a cyber-attack that infiltrates the user’s computer through a third-party program that has access to your system...
Oct 21, 2021


You're Profiled and Tracked. By Algorithms.
The methods by which companies track and identify its users vary from company to company. But, some of the most widely used methods for...
Oct 20, 2021


The Threat of Phone & E-mail Attacks on Restaurants
By Hunter McCurry This week’s article will cover attacks and scams executed on restaurants by cybercriminals and scammers. These types of...
May 12, 2021


When China used LinkedIn for Espionage
Facebook has over 2.8 Billion users. LinkedIn has over 740 Million members. Twitter has over 350 Million users. Instagram has over 1...
May 6, 2021


Ways to elevate your Cybersecurity at home
As more and more people continue to work from home due to COVID-19, quarantine, social distancing, and required Work-From-Home, hackers...
Oct 22, 2020


What your Devices know about you
What do your devices know about you
Dec 23, 2019


The Wangiri Scam
It seemed odd to me that a type of telephone scam that's been around for a while and raises it's head during the holidays would be called...
Dec 19, 2019


Falling Down: Healthcare Information Security.
This post is courtesy of a guest writer with decades of experience in public and private healthcare. As a BSN and RN for over 20 years, I...
Nov 11, 2019
bottom of page
