Today’s world is more interconnected than ever before. Yet, for all its advantages, increased connectivity brings increased risk of theft, fraud, and abuse. As Americans become more reliant on modern technology, we also become more vulnerable to cyberattacks such as corporate security breaches, spear phishing, and social media fraud.
read more
Cyberspace and its underlying infrastructure are vulnerable to a wide range of risk stemming from both physical and cyber threats and hazards. Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services.
read more
With the April 15 deadline approaching, millions of Americans are finalizing the preparation and filing of their taxes. Unfortunately, tax season is a busy time for cyber criminals and scammers as well.
read more
To help ensure customers' trust and security on eBay, I am asking all eBay users to change their passwords.Here's why: Recently, our company discovered a cyberattack on our corporate information network. This attack compromised a database containing eBay user passwords.What's important for you to know: We have no evidence that your financial information was accessed or compromised. And
read more
Your computer screen freezes with a pop-up message—supposedly from the FBI or another federal agency—saying that because you violated some sort of federal law your computer will remain locked until you pay a fine. Or you get a pop-up message telling you that your personal files have been encrypted and you have to pay to get the key needed to decrypt them.
read more
Make sure you have updated antivirus software on your computer. Enable automated patches for your operating system and web browser. Have strong passwords, and don’t use the same passwords for everything. Use a pop-up blocker. Only download software—especially free software—from sites you know and trust (malware can also come in downloadable games, file-sharing programs, and custo
read more
A fairly new ransomware variant has been making the rounds lately. Called CryptoWall (and CryptoWall 2.0, its newer version), this virus encrypts files on a computer’s hard drive and any external or shared drives to which the computer has access.
read more
Cyberbullying Tactics 2015 is a prevention education article and website page resulting from my research conducted in October 2014, along with input from parents, educators and pediatric professionals. Cyberbullying is one typology included in my Information Age darkside of human consciousness construct. Of the seven typologies, cyberbullying is the only profile that requires the aggressor and tar
read more
Business security professionals make it a point to study their craft and learn ways to counter evolving threat. Business intelligence methods need to continue to keep up with technology to analyze and prevent the internal and external influences that can ruin the enterprise. The threats corporations face include: theft, vandalism, workplace violence, fraud, and computer attacks. Through a system o
read more
It is possible to have excellent security and not be compliant, and it is also possible to pass a compliance audit and have a very poor organization security. The illusion that compliance equals security has led organizations to excessively spend on compliance at the detriment of security.
read more