Tech Insights

rss

Contributor Columns on Information Technology and Security

Are you considering moving aspects of your business into the cloud?   Change is scary for many people—and so too it goes in the business world. While the statistics prove businesses are continuing to migrate to the cloud, not all are doing so without trepidation. While any decision that will transform ...

Data Privacy Day was Wednesday, January 28, and these days the concept of “privacy” can be ambiguous, generic or confusing. What you might think of as private actually isn’t. The definition of personal identifying information, by the U.S. privacy law and information security, is that of data that can ...

In the last few days, a number of tech magazines like Computerworld and PC Advisor have reported that FraudFox VM poses a threat to the security of online businesses—especially banks and payment services. FraudFox VM is a special version of Windows with a heavily modified version of the Firefox browser ...

The number of apps developed and published continues to grow at an explosive rate on a daily basis, thanks to continued investments in the app ecosystem and the app developer community – including Apple’s recently announced strategic partnership with IBM, Apple’s App Extensions feature, and the introduction of new ...

Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security flaws in the news, it seems like a lot of us don’t think it ...

These days, it is hard to pick up a newspaper or go online and not see a story about a recent data breach. No other example highlights the severity of these types of hacks than the Sony breach late last year. While a lot of information, including creative materials, financials ...

Perhaps you’ve read that “HTTPS” at the start of a website address means that the site is secure, encrypted. However, a feature of the HTTPS can track you, says an article at theregister.co.uk. HTTP is not secure. Carnegie Mellon University in a Register article states “HSTS”, which is “Strict Transport ...

A phishing attack is a trick e-mail sent randomly to perhaps a million recipients, and the thief counts on the numbers game aspect: Out of any given huge number of people, a significant percentage will fall for the trick. The trick is that the e-mail contains certain information or is ...

You wouldn’t know it if you looked at it, but Skype, with the help of thousands of programmers at Microsoft, may be on the cusp of transforming human communications as we know it. How so, you ask? Well, for starters, when was the last time you understood someone speaking ...

IDC, an IT analyst firm, estimates that the mobile worker population could reach 1.3 billion by 2015, meaning, they access workplace data outside the workplace. This is risky because it exposes data to hackers. In fact, the safety of what’s displayed on the computer screen in public is of huge ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its