Cybersecurity

How To Keep Employees Alert Through A Phishing Simulation

As a business owner, you can teach employees all day long with tech guides or links to YouTube videos, but nothing educates an individual quite like submerging them in the reality of a dangerous situation. That’s the aim of a phishing simulation, to expose employees to a realistic scenario where they can learn from their

[ Read More ]

Fake Fingerprints Prove To Be A Biometric Security Risk

The one thing we thought was more unique than a snowflake—our fingerprints—can now be hacked. Straight out of a science fiction movie, you can’t make this stuff up. The advent of biometric technology, which is the technical term for body measurements and calculations, has made fingerprint and facial recognition the method of the moment for

[ Read More ]

This Company Found Three Big Security Problems In Macs

iPhones are probably Apple’s most popular product, but a lot of people also use Mac computers, especially if they work in a creative industry like video production 0r just want to look cool at the local coffee shop. But the truth is, those pricey MacBooks aren’t perfect—and even though seem to get thinner and lighter

[ Read More ]

Why Launching A Cyber Attack On An Airplane Is Way Too Easy

Sometimes just the thought of a vacation or even leaving town for a few days is enough to help you forget your cybersecurity troubles—especially when you step onto a comfortable, modern jumbo jet. But it may surprise you to learn that the airplanes we often regard as safe are actually riddled with their own digital

[ Read More ]

Not a Good Year for Healthcare Industry Data Security

The year 2018 has not been a healthy one for the healthcare industry, specifically when it comes to disastrous data breaches. Unfortunately, this is part of a larger trend, which does not show signs of letting up and has been affecting digital health records for years. Despite the push for better awareness among healthcare organizations at

[ Read More ]

Colossal Privacy Risks of Everyday Digital Afterimages

What’s an afterimage, you ask? It is a visual phenomenon where a picture continues to appear in your sight, even after you’ve stopped looking at it. You know the one. If you’ve ever seen a spot of light after a bright camera flash, you’ve experienced an afterimage. Try the following experiment. Stare right at bright

[ Read More ]

When You Think About Security, You’re Doing It Wrong

One of the biggest challenges we face in the world of cybersecurity is not phishing attacks or ransomware or firewall disasters—but rather, our name. Coined for the industry about 30 years ago, the term cybersecurity connotes some fairly off-putting feelings. For people on the outside, it can feel forbidding, fear-based, or even downright scary—so many

[ Read More ]

Is There An Easy Way Startups Can Prevent Deadly Data Disasters?

When it comes to cybersecurity and data protection, small to mid-sized businesses (SMBs) and startups face the same big risks as large enterprises . Only, when founders are busy bootstrapping, fundraising, and prototyping, there’s not a lot of time to be stuck in a server closet dedicated to security. Nor is there time to have

[ Read More ]

How Can Digital Security Help In The Battle Against Gun Violence?

Digitally speaking, your information must have the freedom to move around the internet—connecting, sharing, transmitting, and making the technological world turn. And physically speaking, our bodies must also be able to move around the world in relative safety, working and thriving to keep our lives in motion. It is at this juncture between what we

[ Read More ]

Beware The Dinosaurs: Colossal Threats That Are Hardly Extinct

Classic hacks—they’re still with us. Every day, the internet is filled with new threats and amazingly creative exploits that stun the imagination. But damage is also continually being done by the “oldies-but-goodies” of yesterday. Despite the fact that many of these cyber attacks were first attempted when the internet was in its infancy, they remain

[ Read More ]