Traveling overseas on business is exciting and rewarding and thwart with some hidden dangers including being scammed. In my experience in some countries business travellers are a better target than your average holiday maker or tourist. Not only do that have the usual treasures like money and valuable they also have sensitive and confidential business […]
Internet trolls use their “LULZ” to track how well and often they are able to disrupt other parties’ equilibria. A troll might knowingly post a comment or image that other people find offensive, but that troll will use the tagline “I did it for the Lulz” to off-handedly justify his posting. (For the uninitiated, “Lulz” […]
What are some word associations you have with the term hacker? Words like crook, cybercriminal, Fancy Bear, Anonymous, activist or hacktivist might jump to mind pretty quickly. Doesn’t it seem peculiar that the words cybercriminal and activist are associated with hacker? The goal of a cybercriminal is to blackmail and extort money. The goal of […]
Regardless of the type of business you’re running, you likely have some information that you need to keep secure. And because email is generally the fastest and easiest way for you to conduct your business communications, ensuring that any and all sensitive information that you send via email is safe from prying eyes must be […]
For every problem that technology solves, it just seems to create another one. A key issue that has been made worse by new technology is business security. Don’t get the wrong idea here. We’re not suggesting that businesses were secure in the past. Quite the opposite. But at least the threat to businesses in the […]
Every business needs protection. They can all be at risk from security breaches, either digitally or in “real life”. The threats companies could face include anything from theft to breaches in mobile security. Business owners need to ensure that they allocate a budget for protecting their company. Someone also needs to be in charge of […]
We hear it all the time: Macs are safer than PCs when it comes to viruses. And on the surface, that is largely true, although there is a growing amount of malware that is directed toward Apple devices. The problem, though, is that many Mac owners are lulled into a false sense of security when […]
Internet security expert McAfee has launched a guide to help people learn more about the threats they face online. The Ultimate Guide To Security Threats aims to fill in the gaps in knowledge many web users have about the very real risks involved in spending more time and money online.
Every business owner wants to protect their business from external threats. This is an understandable desire, but how can it actually be done? There are some essential things that you will simply have to do, and here they are.
Ransom is an ugly word. It conjures up images of violent kidnappings, dark basement rooms, and cut-and-pasted letters demanding financial compensation. Most Americans are fortunate enough not to come face-to-face with real-life kidnappers in their daily lives, but kidnapping is a sad fact of life in many parts of the world. Goodness knows how many […]
Whether you’re a brick-and-mortar operation or an online-only business, protecting yourself from crime can be challenging. In a world of increasingly sophisticated cyber-attacks, it’s vital to be up-to-date on the latest scams and digital theft techniques. Though it’s impossible to be perfectly prepared, there’s a lot you can do to make a thief or hacker’s […]
Hackers can cause serious issues for a workplace and the issues they present are more dangerous than ever before. So, how do you ensure your business has it right when it comes to protecting itself from the wrongs that hackers do – we take a closer look.
If you own or run an e-commerce site, take a few extra minutes before declaring that yes, of course your website is prepared for this holiday seasons’ influx of online shopping. During this time of the year, people all over the world are shopping for gifts for their loved ones. Due to the nature of […]
You wouldn’t just hand over your books to anybody on Craigslist who claims to have ‘experience with accounting’ would you? Of course not! Why, then, would you trust a security, networking or communications company simply because they have a website? The answer, of course, is that you wouldn’t. You would make sure that any company […]
One of the reasons that the Apple operating system was perceived to be so safe throughout the late nineties and early 2000s is that the user base was relatively low. The use was also limited to professional settings, so there wasn’t likely to be much more than a work email address from a Mac user.
New technology initiatives such as cloud computing, mobility and BYOD are designed to reduce cost of business however the security sector sees a widening gap between the ever growing complexity of connected devices and the ability of the security team to secure the environment and quickly detect and resolve incidents within the business.