What You Need To Know About Cloud Computing

What is cloud computing? Where does data go when it is “in the cloud?”  How does it work? Cloud computing delivers computing services like running applications, storage, processing, etc. over the internet, typically at a monthly fee.  You can use the cloud essentially as a separate system where you save files and important information.  You…

All-Access to Insider Threat

Insider threats are the highest cybersecurity risks for companies today.  Maybe you have a small business where you know each and every one of your employees.  Maybe you’re the CEO of a large corporation and you don’t have time to know all of your employees.  Wherever you work, insider threat is an issue for you. …

Why Cyber Security Matters

Cyber security matters for a lot of reasons, but we wanted to narrow them down.  Not only is cyber security good for your business, it is also good for your personal data.  Taking the measures to protect your data may sound taxing, but they will be worth it in the long run.  You’ll pat yourself…

Data Privacy Steps

We have moved into this new age of social media where many people disregard the difference between their private life and their public life.  For example, it used to be that you didn’t talk about the arguments you have with your spouse, your financial troubles, or a family member’s personal health.  However, today people call…

10 Facts About Cybersecurity That’ll Keep You Up at Night

Read on, if you dare, but these truths about cyberattacks and cyber security will keep you up at night. 1.  Mobile cyberattacks have increased 40% in the past year One example of mobile cyberattacks?  Malware found in mobile apps.  While physical mobile devices, like the iPhone or Android, have been secured, apps are vulnerable.  When…

Changing Your Password? Follow These Tips

When it comes to passwords, there are too many opinions on the “right” thing to do.  Do you change them every 3 months, 6 months, 2 years?  Should you use capital letters, lowercase letters, or numbers and symbols?  Do you need a password of 12-15 characters or 15-20?  To dissipate all the confusion, we are…

It’s Time to Educate Your Employees

The uninformed and the only-a-little-informed employees are your weakest link.  95% of security breaches involve someone simply making a mistake.  Negligence is one of the most costly insider threats to businesses today.  Surprised?  While it’s true that malicious insider attacks are more complex, they do not occur as frequently as negligent threats.  Negligence costs companies…

The History of Cybersecurity

In the history of cybersecurity, attacks like ransomware, viruses, and malware were not always a major problem for businesses.  Cybersecurity only came into existence because of the development of viruses.  So, how did we get here? Where it all began. In 1969, UCLA professor, Leonard Kleinrock, and student, Charley Kline, sent the first electronic message…

The 11 Cyber-Gurus to Follow on Twitter

If you want to learn more about cybersecurity, digital solutions, or technology tips, here are our top 11 suggestions of which cyber-gurus to follow. 1.  Eugene Kaspersky () Kaspersky is the Chairman and CEO of Kaspersky Lab (@kaspersky) with 28 years of experience in cybersecurity solutions under his belt.  His feed is full of informative…