• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Search

Search results

Data Breach- The Best Defense is Vigilance

简体中文 日本語 There have been several high-profile data breaches impacting millions of consumers in the past year. And along with the details come the constant reminder to be vigilant. Consumer security expert Gerry Egan says awareness is key, but so is unders ...
Blog Post
Author:
AllenKelly Employee
Posted:
04-Sep-2014 | 9:42PM
Comments:
1
Kudos:
1

Russian Hackers Collect 1.2 Billion Passwords In A Mega Breach

The New York Times has reported the largest known collection of stolen Internet credentials by a Russian crime ring. These hackers reportedly amassed 1.2 billion username and password combinations, and more than 500 million email addresses from 420,000 we ...
Blog Post
Author:
Solange_Desc Employee
Posted:
05-Aug-2014 | 5:58PM
Comments:
3
Kudos:
2

How To Choose a Secure Password

Strong, secure passwords are one thing that stands between you and a potential data breach. Here are some tips on how to make your passwords more secure and ways to manage them all. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
30-Sep-2014 | 9:57AM
Kudos:
2

Security Concerns and the Connected Car

Connected cars are a relatively new technology in the Internet of Things, however, we've dug a little deeper into this tech. Read on to learn just how secure these technologies are and what you can do to safeguard your personal information. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
15-Oct-2014 | 2:07PM
Kudos:
1

My Account May Have Been Hacked—What To Do Now?

简体中文 日本語 You may have seen it on the news recently; 7 million Dropbox usernames and passwords were allegedly stolen. Initial reports were that the Dropbox service itself had been hacked; however, the company issued the following statement on their blog: T ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
14-Oct-2014 | 7:48PM
Kudos:
2

Traveling? Don’t Let Your Mobile Data Stray

Mobile devices are popular with employees and travel, granting them the ability to work while on the go. However, the information on these devices is very vulnerable if it were to fall into the wrong hands. Here are some tips on traveling with your compan ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
20-Oct-2014 | 11:11AM
Comments:
6
Kudos:
2

Theft-Proof Your Mobile Data

What would your company do if an employee's device was lost, or even worse, stolen? Does your business  have measures in place to protect the data on the device? ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
20-Oct-2014 | 10:59AM
Kudos:
0

Are Your Vendors Putting Your Company’s Data at Risk?

Your business shares sensitive data with the vendors it works with, such as CPAs and payroll companies. Is your business asking the right questions to these vendors to ensure that data stays secure? ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
20-Oct-2014 | 10:38AM
Kudos:
0

The Importance of Two-Factor Authentication

With reports of data breaches becoming more frequent, now is the time to look into ways to make your accounts more secure. ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
15-Dec-2014 | 10:44AM
Comments:
2
Kudos:
4

Top 10 Small Business Resolutions & Strategies To Achieve Them

With the New Year ahead, and cyber threats continuing to loom over businesses, 2015 will likely bring more sophisticated and complex attacks. Security analysts called 2013 “ The Year of The Mega Breach.” According to Symantec’s 2014 Internet Security Thre ...
Blog Post
Author:
Melissa_Segura Employee
Posted:
05-Jan-2015 | 10:20AM
Kudos:
3

What to Do in the Event of a Major Data Breach

Stories of massive corporate data breaches in the media are becoming all too common today. So common that the FBI now considers cyber attacks on US companies one of its top law enforcement priorities. Unfortunately, as technology progresses and all of our ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
05-Feb-2015 | 5:33PM
Kudos:
2

Are Your Devices Listening In On Your Conversations?

简体中文 日本語 Português Español Is it time to start speaking in code in your living room? Recent tech buzz has fingered voice control on your smart TV as a security risk, listening in on your conversations in order to utilize voice commands, and then sending t ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
19-Feb-2015 | 1:33PM
Comments:
1
Kudos:
3

What To Do In The Event Of A Bank Breach

You may have heard in the news recently that an Internet crime group, Carbanak, stole up to one billion USD by targeting the institutions themselves rather than individual customers. They transferred funds to controlled accounts and hacked ATMs via SMS me ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
17-Feb-2015 | 4:30PM
Kudos:
2

What Happens When Your Identity Is Stolen?

The IRS has announced that it will be notifying taxpayers after third parties gained unauthorized access to information on about 100,000 accounts through the “ Get Transcript ” online application. You can view more about the breach via a statement on the ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
27-May-2015 | 3:05PM
Kudos:
1

Data Breaches Aren't Going Away- What You Need To Know

It may seem like stories of massive data breaches are popping up in the news on a weekly basis these days. Unfortunately, this is not surprising. As technology progresses, all of our information moves to the digital world, and, as a result, cyber attacks ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
05-Jun-2015 | 1:23PM
Comments:
2
Kudos:
2

APNewsBreak: Massive breach of federal personnel data

  Jun. 4, 2015 6:06 PM EDT http://bigstory.ap.org/article/245283cacee84b14a95880ef9593172a/us-officials-massive-breach-federal-personnel-data I do not need a solution (just sharing information). ...
Forum Thread
Author:
bjm_ Guru
Posted:
04-Jun-2015 | 3:25PM
Comments:
1
Kudos:
0

Team GhostShell Hacking Group is Back

A group of hackers known as Team GhostShell, claims to have hacked a multitude of organizations, including financial institutions, government agencies, political groups, law enforcement entities, and universities. Using a Twitter account, these cybercrimi ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
30-Jun-2015 | 12:11PM
Kudos:
1

New Vulnerability in OpenSSL Could Allow Attackers to Intercept Secure Communications

A new weakness in OpenSSL could allow attackers to hijack secure communications by tricking a targeted computer into accepting invalid and untrusted SSL certificates as valid certificates. This could help facilitate man-in-the-middle (MITM) attacks, where ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
09-Jul-2015 | 4:36PM
Kudos:
2

HackingTeam Data Dump Leads to Adobe Zero Day Discovery

A new zero-day vulnerability in Adobe Flash Player was discovered via a cyberattack against the hackers-for-hire firm Hacking Team. A large amount of internal information leaked by the attackers contained data on the exploit, which could crash a computer ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
07-Jul-2015 | 10:51AM
Comments:
27
Kudos:
6

UCLA Health Suffers Possible Medical Breach

Healthcare is Big Business for Cyber Criminals The healthcare industry is a prime target for attackers because healthcare data is a treasure trove to cybercriminals. By targeting a hospital’s records rather than just a credit card number or financial data ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
17-Jul-2015 | 5:40PM
Kudos:
1

Popular Photo Printing Website Suffers Possible Credit Card Data Breach

A popular photo printing website has announced that customer credit card data collected by a third party vendor may have been breached. As a precautionary measure, the company has temporarily disabled their website while the investigation into the breach ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
17-Jul-2015 | 3:32PM
Kudos:
2

Scammers Take Advantage Of Ashley Madison Breach

Scammers are taking advantage of the latest big data breach of the online dating site, Ashley Madison. Find out how to stay protected and how Norton has you covered. ...
Blog Post
Author:
Solange_Desc Employee
Posted:
27-Aug-2015 | 4:13PM
Kudos:
1

Up To 5 Million VTech User Accounts of Parents and Children May Have Been Compromised in Data Breach

This week, VTech, a global company that manufactures Internet connected learning products for young children announced that they have been involved in a massive data breach. The company’s learning devices, such as a smartwatch and smartphone, allow kids t ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
01-Dec-2015 | 2:13PM
Kudos:
1

Kirby the North Pole IT Elf Presents: Paper or Plastic

Our favorite holiday IT elf is back with some more holiday shopping tips! This week he reviews "paper or plastic," and we're not talking about grocery bags.  ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
08-Dec-2015 | 9:00AM
Kudos:
0

13 Million MacKeeper User Accounts Exposed

Earlier this week, white hat hacker Chris Vickery announced that he was able to gain access to over 13 million MacKeeper user accounts. A vulnerability was exploited in the company’s servers, which exposed the usernames, email addresses and other personal ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
15-Dec-2015 | 2:34PM
Comments:
1
Kudos:
0

Credit Monitoring Services and Other Anti-Fraud Protection

Identity theft is the most common complaint lodged with the Federal Trade Commission, to the tune of 11.7 million a year. That means roughly one-in-five Americans over the age of 16 have become victims of identity theft. 14 percent of those victims experi ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
21-Jan-2016 | 3:07PM
Comments:
1
Kudos:
1

Cyber Security Top Tips for 2016

2015 was a banner year for cybercriminals. We reported on 53 events that made it into the headlines, however that was just what we reported. There were many more than that occurred. We took a look at what was trending to try to predict the next “big thing ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
20-Jan-2016 | 3:57PM
Comments:
6
Kudos:
2

Participating in Legitimate Surveys- What Personal Data is OK to Give Away

Companies of all sizes use online surveys to gather important market research, which they later utilize to direct product development and marketing initiatives. This critical step in the marketing process is appealing to some online users because they get ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
17-Feb-2016 | 11:25AM
Kudos:
0

Software Terms of Service and Privacy Policies Explained

Português Español If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as “grayware,” count on you allowing th ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
10-Feb-2016 | 2:25PM
Kudos:
0

Symantec Financial Threats Report Gives Consumers Security Tips

It’s tax season, so our finances are top of mind for many of us. Cybercriminals are thinking about our money, too. After all, most cybercrimes are committed for monetary gain. According to the Symantec report titled “ Financial Threats 2015,” cyber thieve ...
Blog Post
Author:
J2K2 Employee
Posted:
24-Mar-2016 | 8:08AM
Kudos:
2