Tech Insights

rss

Contributor Columns on Information Technology and Security

You wouldn’t know it if you looked at it, but Skype, with the help of thousands of programmers at Microsoft, may be on the cusp of transforming human communications as we know it. How so, you ask? Well, for starters, when was the last time you understood someone speaking ...

IDC, an IT analyst firm, estimates that the mobile worker population could reach 1.3 billion by 2015, meaning, they access workplace data outside the workplace. This is risky because it exposes data to hackers. In fact, the safety of what’s displayed on the computer screen in public is of huge ...

WIX Websites  is a leading Israeli company that provides cloud-based visual development and editing environments that make it easy for IT pros to set up anything from websites to web-based businesses. WIX has created a state-of-the-art, creative way to design websites. With the opportunities and add-ons available on their website, ...

Mashable.com says that recently over 98,000 photos have been leaked from Snapsaved.com, which has shut down. The Snapchat app makers won’t take any credit, even though previously, 4.7 million phone numbers and usernames were leaked. The company seems indifferent, though this May, they reached a settlement with the FTC. Snapchat ...

On August 30th, 1982, a copyright for a Computer Program for Electronic Mail System was issued to Shiva Ayvadurai. Thus, email was born. 32 years later, email has become an essential part of our lives. Emails are a must-have item, allowing us to connect and share information with friends, ...

Everything seems like it is connected to the Internet, just about, including TVs, home thermostats, sprinkler controls, door locks, egg trays (yes, there’s an app for that), tooth brushes (cray cray), and more. A study by HP shows that 70 percent of devices have vulnerabilities. Researchers have revealed that most ...

Cyber storage does not always equal a secure backup. Users of cloud storage have many potential tools at hand to beef up security. And just because cloud services have some loopholes doesn’t mean you should just throw in the towel, as the saying goes, and figure “What’s the point?”. ...

A good customer base is a small company’s most valuable asset. Customer retention is one of the major drivers of a company’s growth and plays an important role in establishing a reliable bottom line. In fact, Gartner Research just revealed that 80% of a company’s initial revenue comes from 20% of its ...

Imagine it. You sit down at your computer about to do your daily perusal of Buzzfeed  or check out The Financial Times but your homepage is now some weird search engine you’ve never seen before. Guess what? You’ve been hijacked. Browser hijacking is when your Internet browser (eg. Chrome, FireFox, ...

Hacking isn’t just about weak passwords and single-factor authentication. A lot of it occurs because people can be so easily tricked into giving up personal information: the craft of social engineering. Example: “Download this video of Kim K fully naked!” How many men would be lured into clicking this ...

The Number One Menace to All Organizations
 

Learn more about how to protect your organization against this growing menace
https://info.knowbe4.com/ransomware-simulator-tool-its