21 Results from 2018
Robert Siciliano Security Analyst at Safr.me
It seems like 2017 broke records for all the wrong reasons…one of them being the worst year for data breaches in history. According to reports, hacking was the most common way to collect this data, but almost 70% of exposures occurred due to accidental leaks or human error. This came down to more than 5 billion records. There were several well-kn...
07 September 2018 /security
Criminals have a reliance on tricking victims to get access to account information, like passwords. This is known as social engineering, and is also called a “confidence crime.” These come in many forms: Do Not Take the Bait of These Phishermen A phishing email that targets a specific person is known as spear-phishing. A spear-phishing email look...
27 July 2018 /security
Even if you have the best security on your computer network, you might have noticed that you still seem to get hacked…or worse. Ask Equifax. Why is this happening? It’s probably because a member of your staff has made it easy for cyber criminals to get inside. It’s really important that you find out who this person is, and keep in mind…it might be...
18 May 2018 /security
Most small businesses don’t put as much focus on internet security as they probably should. If you are a small business owner or manager, not focusing on internet security could put you in a bad spot. Are you believing the myths about internet security or are you already using best practices? Here’s a few of the most common myths…take a look to se...
11 May 2018 /security
If you are working for an IT security company, I have a message for you: the term “identity theft protection” is way overused and even abused as a marketing term. We know that this term is used to sell services and products, but does it really protect a user from being the victim of identity theft? No. This is no different than labeling a food as...
06 April 2018 /security
Do you ever use the same password over and over again for different accounts? If so, you are not alone. However, this is quite dangerous. It’s best to use a different, unique password for each account, and to make it easier, you should use a password manager. According to surveys, people understand that they should use unique passwords, and more th...
19 March 2018 /security
There are many ways that you or a small business could get caught up in a social media disaster. Can you think of any off the top of your head? If you are like most of us, probably not. Here are 14 ways that you could be in danger: A Terrible Online Reputation – Do you keep a watchful eye on you or your business’ Facebook page? Are people posting ...
03 March 2018 /security
The definition of criminal identity theft is a crime where the criminal impersonates the victim in order to protect their innocence. This can lead to victims getting fines or even getting arrested and charged for crimes they did not commit. How Does This Happen? There are a number of ways that a criminal can pull this off, and it generally occurs w...
23 February 2018 /security
Not all viruses that find their way onto your computer dramatically crash your machine. Instead, there are viruses that can run in the background without you even realizing it. As they creep around, they make messes, steal, and much worse. Malware today spies on your every move. It sees the websites you visit, and the usernames and passwords you ty...
08 February 2018 /security
Do you have employees who bring mobile phones to work and use those devices on the corporate network? Do they store company data on these “Bring Your Own Devices (BYOD)”?? Does your company have a policy in place for this? First, the moment a person brings in their personal phone to work, there is a fusion of personal and business tasks that occur....
11 January 2018 /security
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.