We’re all guilty of it: connecting to free public WiFi. Whether it’s at the coffee shop, hotel or airport, the temptation to check e-mail and surf the web is just too strong to resist. So, BEFORE you connect to any free, public WiFi, make sure the connection is legitimate.
If you’re using a personal Box, Dropbox, OneDrive, Google Drive or other consumer-grade file sync and sharing cloud applications, listen up! These applications pose a huge threat to your company because company data can be spread far and wide without central oversight of what information is being shared with whom.
So, you’re in the car on the way home from Starbucks, basking in the glow of consuming your triple-shot, low-foam, extra-hot pumpkin-spice latte, when you suddenly realize your laptop has gone missing. You drive back like the caffeinated lunatic you are, only to discover no one has turned it in. What do you do? That depends on what precautions you have (or haven’t!) taken.
Like it or not, device manufacturers LOVE to fill your brand-new PC, tablet or phone full of “free” applications like games, music and photo apps and more (manufacturers actually get paid to install these with the devices they sell).
Here’s a sneaky trick used by many hackers: they purchase and set up a fraudulent website that is a close misspelling of a legitimate one.
There are thousands of hackers who get up every morning with ONE goal in mind: to find a new vulnerability in a commonly installed software (like Adobe, Microsoft Office, Chrome, QuickBooks, etc.) to gain access to MILLIONS of their users.
The “dark web” or “deep web” is a part of the World Wide Web we know and love that is accessible ONLY via a special software that allows users and website operators to remain completely anonymous and untraceable. That’s why it’s the playground for hackers, cybercriminals, drug deals, human trafficking and more.
A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular website or to click and download a virus.
Zero trust is a relatively new cyber security strategy that is rapidly becoming the security model of choice for businesses. In fact, we anticipate this to be the new standard to meet data protection compliance for all organizations, large and small.