Feature Technology Reports

rss

Latest Articles

Contributor Columns on Information Technology and Security

Protecting Yourself from a Data Breach Requires Two Step Authentication

Protecting Yourself from a Data Breach Requires Two Step Authentication

Have you ever thought about how a data breach could affect you personally? What about your business? Either way, it can be devastating. Fortunately, there are ways that you can protect your personal or business data, and it’s easier than you think.

Your Hacked Mobile Phone Number is Like Your Social Security Number

Your Hacked Mobile Phone Number is Like Your Social Security Number

If you have a cell phone, and you use it in any way associated with accessing online accounts (and many do), you are putting yourself at risk of getting hacked. With only a phone number and a bit of information, which is easy to get through social engineering, a hacker can break into your personal and financial accounts.