Tech Insights

rss

Contributor Columns on Information Technology and Security

#1. Whenever possible, configure your Internet connection to always use HTTPS. This is the “https” that appears before the “www” in a Web address, and the https is preceded by a padlock icon. For Gmail, this works by clicking Settings in the top right; select the General tab, then hit ...

As anyone who has been watching the cybersecurity area has noticed, the threat level from cyberattacks has risen dramatically. Not only do we have to worry about cybercrime or theft of corporate secrets, but we are now beginning to understand that a determined enemy could take down our basic ...

While the majority of the world’s largest and most well known VCs are in Silicon Valley, that does not mean that all of the best performing VCs are in Silicon Valley or even the US. One of the world’s top VCs by performance – which many casual tech aficionados ...

As even casual observers of the IT industry are aware, cloud computing is dramatically changing the industry. In organizations large and small, IT specialists are wrestling with how and when to move their enterprise's data to the cloud as well as what will happen to it once it's there. ...

Ahhh, it’s that time of the year again: the hustle and bustle of the holiday season—parties, gift giving, travels and get togethers with friends and family. But it also brings up the question of how and when are you going to have time to shop and get everything done ...

If you feel paranoid about online surveillance, there are ways you can significantly shrink your cyber presence so that it’s more difficult and expensive for anyone and even big intelligent agencies to monitor your online activities. 1. End-to end Encryption This tactic encrypts your data from the beginning point of communication ...

What is catphishing? This recently coined term refers to false online identities created by Internet scammers to deceive people into a long-term romantic or emotional relationship. How can you tell you’re being catphished? Out of the blue, some really attractive person begins communicating with you online. ...

Whether you are an individual who games, a work-at-home employee, a family of four that shops online, a road warrior or even a small business, chances are you have data to protect—and so this all pertains to you. Fundamentals: Antivirus isn’t enough: A free antivirus package is good, but it might ...

Every week I receive emails from people asking how they can protect their privacy online. It seems like there have been more and more data security breaches, and therefore awareness about the potential to have our information exposed is growing. In fact half of us worry about the amount ...

There is no such thing as a truly secure password; there are only more secure or less secure passwords. Passwords are currently the most convenient and effective way to control access to your accounts. But passwords are a mess. We have too many; sometimes they are all the same, ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its