Technology Can Only Protect You So Much — Then Other Tactics are Needed

Technology Can Only Protect You So Much — Then Other Tactics are Needed Businesses of all sizes are now finding that all the technological security they put in place cannot protect them from threats that go after identity and credentials access. In the...
Lessons We Failed To Learn and Therefore Are Doomed To Repeat

Lessons We Failed To Learn and Therefore Are Doomed To Repeat

Lessons We Failed To Learn and Therefore Are Doomed To Repeat   It seems as every year gets worse and worse when it comes to Cyber Breaches and Cyberattacks. Compared to 2018 were have had 33% more breaches this year. They are, after all of our data, personally...
Hand in Hand On Black Friday — Shopping and Privacy

Hand in Hand On Black Friday — Shopping and Privacy

Hand in Hand On Black Friday — Shopping and Privacy   Black Friday is almost upon us!  The day that retailers finally able to move from a red accounting register on to the black and it is always met with sales and loss leaders (great prices but not for the...
Convenience Gadgets – Design, Functionality then Security

Convenience Gadgets – Design, Functionality then Security

Convenience Gadgets – Design, Functionality then Security   The first half of this year has been marked with a rampant increase on all those little gadget devices known by the acronym, IoT. These are any small device or controller that is network connected....
Major Cell Carrier Program Protects Customers from SimSwapping

Major Cell Carrier Program Protects Customers from SimSwapping

Major Cell Carrier Program Protects Customers from SimSwapping T-Mobile is taking action against the social engineering attack known as Sim Swapping. Using a non-advertised and rather private feature knowns as “NOPORT” to prevent the tricking of their...
Malcare WordPress Security