Tech Insights

rss

Contributor Columns on Information Technology and Security

Wired internet or wireless WiFi, the warnings are out there: Don’t visit any websites that you have important accounts with when using a public computer (hotel, airport, café, etc.). Visiting even a more trivial account, such as an online community for cheese lovers, could sink you—in that a cyber thief ...

Whether you’re an animal person or not, you have to admit that puppies are pretty darn cute. So cute that there are YouTube Channels, Facebook accounts, and Buzzfeed newsletters devoted to the subject. Unfortunately, there’s a not so cute PUP out in the world, and it wants access to ...

Are you considering moving aspects of your business into the cloud?   Change is scary for many people—and so too it goes in the business world. While the statistics prove businesses are continuing to migrate to the cloud, not all are doing so without trepidation. While any decision that will transform ...

Data Privacy Day was Wednesday, January 28, and these days the concept of “privacy” can be ambiguous, generic or confusing. What you might think of as private actually isn’t. The definition of personal identifying information, by the U.S. privacy law and information security, is that of data that can ...

In the last few days, a number of tech magazines like Computerworld and PC Advisor have reported that FraudFox VM poses a threat to the security of online businesses—especially banks and payment services. FraudFox VM is a special version of Windows with a heavily modified version of the Firefox browser ...

The number of apps developed and published continues to grow at an explosive rate on a daily basis, thanks to continued investments in the app ecosystem and the app developer community – including Apple’s recently announced strategic partnership with IBM, Apple’s App Extensions feature, and the introduction of new ...

Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security flaws in the news, it seems like a lot of us don’t think it ...

These days, it is hard to pick up a newspaper or go online and not see a story about a recent data breach. No other example highlights the severity of these types of hacks than the Sony breach late last year. While a lot of information, including creative materials, financials ...

Perhaps you’ve read that “HTTPS” at the start of a website address means that the site is secure, encrypted. However, a feature of the HTTPS can track you, says an article at theregister.co.uk. HTTP is not secure. Carnegie Mellon University in a Register article states “HSTS”, which is “Strict Transport ...

A phishing attack is a trick e-mail sent randomly to perhaps a million recipients, and the thief counts on the numbers game aspect: Out of any given huge number of people, a significant percentage will fall for the trick. The trick is that the e-mail contains certain information or is ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its