Information Security

25 articles
Tax Season Phishing: Peak Time for Big Game

Tax Season Phishing: Peak Time for Big Game

If you follow our Facebook and Twitter feeds then you’ve got a leg up—you know all about the growing phishing epidemic. Well-worded emails from supposed IRS workers or company execs have mislead many a dutiful employee. We’ve warned about this scamming method in the past, and the widespread threat continues to morph. The need for vigilance is vital. For while…
Data Privacy: It Does a Business Good

Data Privacy: It Does a Business Good

Respecting Privacy, Safeguarding Data and Enabling Trust. These tried-and-true tenets resurface every January 28th for the National Cyber Security Alliance’s (NCSA) annual Data Privacy Day (DPD), and 2017 was no exception. DPD’16 saw unprecedented media coverage and impressive levels of engagement online and via social media. Building on that success, the NCSA and its top-notch advisors encouraged even further involvement…
Tax Season Phishing: A Cautionary Tale

Tax Season Phishing: A Cautionary Tale

Joe, Kindly send me the individual 2016 W-2s (PDF) and earnings summaries for all of our company staff for a quick review. This request is time-sensitive and confidential. I really appreciate your cooperation. Thanks, Dave Smith Company CEO www.company.com Whether you’re often in communication with the upper execs at your company or not, the above request would sure get your…
Wiring the Workplace: Grounding Your Cyber Culture

Wiring the Workplace: Grounding Your Cyber Culture

We’re in the home stretch, and 2016 sure was one for the record books, cybersecurity- and other-wise. We’ll spare you a play-by-play, but suffice it to say in the world of all things cyber, we’ve hit a whole ‘nother level. And the upward trend continues, with abundant predictions of threats and concerns looming over the upcoming year. Rounding the bend,…

Cyber Survivor: 6 Tips to Stay Alive

All too often repetition fails at urgency, and as irony goes, the very topic we’re deaf to is the one that should have us all ears. Despite unending cycles of data breaches and subsequent warnings, 60% of small businesses will sustain fatal damage at the hands of cyber criminals. In such a harsh environment, only the fit survive. That’s why…

Zn Dy feature logowifi spoofing (AKA “evil twin”; “man-in-the-middle”): Just as fake as your favorite late show parody, but day and night when it comes to comic relief. A technique used by cyber criminals to trick internet users into trusting bogus wireless networks, WiFi spoofing is no laughing matter. In an attempt to lead the unsuspecting down a path ending in compromised personal data, WiFi spoofing preys on users’ trust, tantalizes with convenience, and relies on our distraction. When traveling, the risk can’t be overstated, with an estimated 89% of global hotspots reported as unsecure. With the help of apps and online tutorials, it’s relatively easy for the average computer literate person to spoof. The resulting reach is broad, and it’s been used to fool folks for years. So while we all love the thought of free WiFi, the fraud and theft that could tag along should make us think twice. How to skip out on the spoof? Check—double and triple—that the network you’re joining is legit, and avoid password-free WiFi. Encryption is key to a secure connection, so always look for “https” in the address bar. And be sure the settings on your device don’t give it free reign to connect at will to any available network. With a few tips under your belt and eyes wide open, you won’t let cyber criminals have the last laugh.

Want more? Subscribe.
070116
Data Sharing and Privacy—It’s a Give and Take Thing

Data Sharing and Privacy—It’s a Give and Take Thing

We all generate a seemingly unending stream of data on a daily basis, much of which flows right into businesses’ info stores. It’s a given that as customers, we’ll have to give to get; we know that much. But what should be expected from the entities that house our personal details? Being Open to Privacy What’s potentially unsettling is that,…
Cyber Tug of War—Win, Lose, or Draw?

Cyber Tug of War—Win, Lose, or Draw?

The opposing forces of privacy and safety are at it again. This time, it’s Apple v. The Feds—heels in the mud, each hoping for victory. On the sidelines, fans make known their stake in the game. But in this tug of war, maybe the real win is when both sides keep their jerseys clean. Get Upfront and Personal Something for…

Zn Dy feature logopci compliance: Don’t let the snore-bore of a name fool you: PCI compliance standards could be your company’s lifeline, packing a solid punch in fighting cybercrime, protecting data security. A set of requirements designed to ensure that ALL companies that “process, store or transmit credit card information” are ardently working to protect said data, PCI compliance is a must. Setting standards and covering tails, PCI compliance opens the door to insurance coverage for really important things, like, say, data breaches. Not only does PCI compliance aim to keep your clients safe and you in the clear, it also keeps hard-earned funds from being thrown away on legal fees, fines and penalties. But PCI compliance is more than “just good business”— it’s a way to show clients some love, proving that you value the trust they’ve placed in your company.

Want more? Subscribe.
041416
Annual Cybersecurity Update

Annual Cybersecurity Update

Another Year of What Seems Like So Much Cyberwocky One more 365, come and gone. Our hyperconnected lives keep us always on the lookout for the next update, the hottest feature, the latest trends for the new year. But then that's also just how we're wired. Yet while we love to leap ahead, a look back can be beneficial too—good,…