Cybersecurity

Why You Should Always Be Nice To The InfoSec Team

Think your job is tough? Unless you’re in information security, puh-leeze. Those guys (and they are mostly guys, but that’s a whole different story) have it really rough. Sure—every job on the planet has tradeoffs, and there will always be some good days and some bad days. But anyone who’s responsible for cybersecurity within an

[ Read More ]

How To Negotiate The Relationship Between Security, Privacy, And Trust

Security, privacy, and trust are three very different things—but when it comes to our digital lives, they are all interrelated. It’s tempting to use the three-legged stool analogy here, but it doesn’t quite work because one of these concepts—trust—is more of a lever than a leg. But we’re getting ahead of ourselves… Let’s Start with

[ Read More ]

Strong New Malware Exploits Microsoft Word For Hidden Attack

One of the main goals of antivirus software is to prevent spyware infections, which cyber attackers can use to breach the confidentiality of your computer’s data. But in order for this malicious spyware to work, it must be able to evade detection by antivirus software. Security researchers have discovered a new cyber attack campaign that

[ Read More ]

Why Facebook Is Now Seeking A Friend In The Security Business

Facebook may not be seeking world domination (just yet), but they are seeking some cybersecurity support in the form of a big acquisition—and for good reason. The social media demigod has had a rough go as of late, with their recent hack compromising the data of over 30 million users (slightly lower than the initial report

[ Read More ]

This Is How Security Needs To Evolve For The Snapchat Generation

You may be sick of hearing about Millennials. Heck, most Millennials are sick of hearing about Millennials—and many resent being lumped into one massive, stereotyped group. It was no different for the Gen Xers who came before them. But there’s a reason why those stereotypes exist—and there are distinct differences among the generations. Next up

[ Read More ]

Why Small Businesses Are Actually Facing Big Security Risks

Unlike well-resourced, large corporations and enterprises with sophisticated infrastructure and cutting-edge technology, smaller organizations like the local restaurant chain, accounting firms, or private medical groups are typically at a disadvantage when it comes to shoring up their information security requirements. In fact, they may not even be thinking about it—and this lapse in judgement carries

[ Read More ]

Online Shoppers, You Better Watch Out For These Scary Security Risks

One thing is for sure—online shopping sure is convenient. All tucked into bed, armed with a credit card and wearing your comfy pajamas is certainly a far cry from driving or taking the bus to a public brick-and-mortar shop where you will likely encounter a million obstacles and possibly not even find the size, color,

[ Read More ]

Why The WiFi Not? Better Watch Out For Those Risky Hotspots

Because making our daily transactions on the go has become such an easy thing, we often don’t think twice about where we are when we hit submit. Hunched over a laptop at a coffee shop, or scrolling on a smartphone while standing in line, it’s easy to focus on your familiar glowing screen and forget

[ Read More ]

This Is How The Dark Side Of Innovation Can Plague Your Business

Time is not a luxury available in any business market. And while no business wants to—or can afford to—undervalue the importance of cybersecurity, it is sometimes overlooked in the push to host an online application or a some new feature for customers. There was a time when security was only added on as an afterthought.

[ Read More ]

Your Digital Health Records Are A Nightmare For Technology

Despite its best efforts over the past two-plus decades, the healthcare industry has seriously lagged when it comes to implementing secure, user-friendly, and fully digitized medical recordkeeping. But this situation has started to shift as people in the field begin to encourage and embrace much-needed change through legacy recordkeeping and the implementation of new technologies.

[ Read More ]