Convenience Gadgets – Design, Functionality then Security

Convenience Gadgets – Design, Functionality then Security

Convenience Gadgets – Design, Functionality then Security   The first half of this year has been marked with a rampant increase on all those little gadget devices known by the acronym, IoT. These are any small device or controller that is network connected....
Standing our Ground on Encryption – without it, we will lose all Privacy!

Standing our Ground on Encryption – without it, we will lose all Privacy!

Standing our Ground on Encryption – without it, we will lose all Privacy!   According to the US Consitution, we have the right to be secure in our persons, houses, and papers. Unlike 1787 when they wrote the constitution, today, “our papers” are digitally...
More Than Three-Quarters of US Businesses Are CyberAtttack Targets

More Than Three-Quarters of US Businesses Are CyberAtttack Targets

More Than Three-Quarters of US Businesses Are CyberAtttack Targets   Cybersecurity incidents are up! Hackers worldwide favorite target du jour are U.S. small and medium-sized businesses. Unfortunately, for many, they have fallen back on the false idea they are...
Popular Game Breaches Personally Identifiable Information of 218 Million People

Popular Game Breaches Personally Identifiable Information of 218 Million People

Popular Game Breaches Personally Identifiable Information of 218 Million People   Do you like to play games on your smartphone or tablet? Word games, crosswords, and word searches and other social brain challenge games are quite popular but none so much as Words...
Audit Logs May Help You Make Your Case — If You Have Them

Audit Logs May Help You Make Your Case — If You Have Them

Audit Logs May Help You Make Your Case — If You Have Them   Most businesses today are fielding malicious attacks on a daily and sometimes hourly basis. Do you keep audit logs of the activity on your computer system? Logs can act as a red flag to identify when...
Malcare WordPress Security