Tech Insights

rss

Contributor Columns on Information Technology and Security

“Cookiejacking” may sound like someone taking a bite out of that delicious chocolate chip cookie you were planning to have after lunch, but it is actually an online security risk that could lead to your personal information falling into the hands of a cybercriminal. But to understand this risk, you ...

Here’s four chief ways how data breaches happen: Illegal access to information or systems. Personal Identifying Information (PII) data can be illegally accessed via technology such as computer hacking or infecting computers with viruses, Trojans or worms—leading to stolen data or malfunctioning systems. ...

However, many parents—perhaps you yourself—use this very same technology to keep tabs on their kids’ computer and smartphone activities. And it’s perfectly legal to do so. It’s referred to as domestic surveillance. And frankly, if you have a 12 year old daughter with a mobile phone, it’s not a ...

What is knowledge-based authentication? The KBA design asks the user to correctly answer at least one question, a “secret” only the user would know. There are two types of KBA: 1) Answering a question that the user has pre-selected (static scheme), and 2) Answering a question that’s determined by garnering ...

Being stuck at an airport due to winter weather can be a real downer, but with an assortment of devices, apps and other instruments for connecting to the world, you can make that down time pass in a jiffy. With today’s technology, gone are the days where you nearly go ...

There’s an app that can practically read your mind via your mobile device. The technology is called predictive analysis, and Google’s Now app is at the forefront. Other apps that utilize predictive analysis include Grokr and Osito: predicting the smartphone user’s next move. How does this work? Snippets of information are assembled via an algorithm, leading to ...

Laptop or PC What should your security software include? A two-way firewall: monitors the activity on your devices making sure nothing bad is coming in (like unauthorized access) and nothing good is leaving (like your data). Anti-virus software: protects your devices from malicious keyloggers ...

Continuing IT Specialist's series of profiles on startups with new solutions or technology which we feel could be of interest to IT professionals, we are pleased to introduce Cumulogic.  Joining us today is Cumulogic Founder and and VP of Products Rajesh Ramchandan who has kindly taken the time to answer some of ...

IT Professionals deal with a variety of issues as the pace of change in the enterprise IT world is changing at perhaps's it's fastest pace ever. From cybersecurity to Cloud computing, IT departments are facing a number of challenges at once. One issue enterprises of all sizes are dealing ...

Thanks to social media, societal norms have undergone a seismic shift in the past five years. What was once considered private or even taboo is not only fair game, it’s expected. But this can have serious consequences from the ending of friendships to exposure to physical harm. I’ve talked about ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its