Search results: "VPN" Page 1 of 2

Best Practices for Using a VPN While Traveling

Who doesn’t love free Wi-Fi? It allows you the flexibility to work from a coffeehouse or hotel room the same way you would from your office or home. Public Wi-Fi networks are convenient, allowing you to stay connected no matter where you are. But they’re also convenient for cybercriminals, as your personal data is less secure when you’re browsing on a public network.

Read More

SiteLock VPN

Top 4 Reasons Why You Need a SiteLock VPN

Take a minute and think about how many times public Wi-Fi has been a source of major convenience for you. Now, think about how many times you have checked your bank account or logged into your social media on a public Wi-Fi connection. Did you know browsing personal account information on a public network is potentially unsafe and can put both your data and privacy at risk?

Read More

SiteLock VPN

Top 4 Reasons Why You Need a SiteLock VPN

Take a minute and think about how many times public Wi-Fi has been a source of major convenience for you. Now, think about how many times you have checked your bank account or logged into your social media on a public Wi-Fi connection. Did you know browsing personal account information on a public network is potentially unsafe and can put both your data and privacy at risk?

Read More

Breached on Black Friday? 56% of Consumers Won’t Return Until After Christmas

The holidays are just around the corner, and with it comes the inevitable holiday shopping rush. In fact, holiday shopping can account for up to 30 percent of annual sales for online retailers.  As Black Friday kicks off what is expected to be another lucrative online holiday season, there are vast opportunities for cybercriminals to steal shopper’s information through spoofed websites, malicious coupon code links, and phishy marketing campaigns. Any downtime resulting from an attack can severely impact holiday profits, not to mention annual revenue. This time of year, it’s more important than ever that ecommerce businesses make cybersecurity a top priority in order to protect their website, customers, and bottom line.

Additionally, consumers should be aware of the risks that exist online to defend their information proactively. Being cyber-aware while shopping online is the new reality for consumers, and it becomes even more imperative during the holiday season. 

Read More

Where do the 2020 Candidates Stand on Cybersecurity Awareness?

The ugly news about Russian interference in the U.S. presidential election forced the issue of cybersecurity into the political spotlight in 2016. Since this catalytic event, political leaders have grappled with cybersecurity awareness on a global stage — and not all have done so gracefully.

Bad actors, whether politically motivated or not, grow increasingly sophisticated as our world becomes more rooted in technology. However, it appears lawmakers aren’t prepared for this reality. One example: too many are in the dark about website encryption — 61% of world politicians’ websites aren’t HTTPS-secured.

Read More

Spyware in the IoT – the Biggest Privacy Threat This Year

Technology. It’s designed to make our homes more comfortable and workplaces more efficient. 

But, every advancement towards realizing a 21st century quality of life comes with a wave of security threats, old and new. The consequences of which are not only born by companies who are the primary targets of cybercrime. Your home systems are more vulnerable than you think.

Read More

Increasing Your Business’s Cyber Threat Intelligence

Authored by Sam Bocetta – Sam Bocetta is a freelance journalist specializing in U.S. diplomacy and national security, with emphases on technology trends in cyberwarfare, cyberdefense, and cryptography.

With more consumers and B2B enterprises conducting business in the cyber world, security threats are an increasing concern. While most business owners and website administrators are aware of the problem, too few have the information or resources they need to combat it. Winning the ongoing battle against cybercrime and criminals starts with understanding the nature of the threats and how to combat them.

How high is your business’ cyber threat intelligence?

Read More

public-wifi-security

How to Stay Secure on Public WiFi

As the digital workforce continues to expand, more people are dependent on public WiFi than ever before. Whether it’s the local coffee shop or co-working space, the availability of an internet connection wherever we go has helped foster a growing segment of remote employees.

However, that convenience can come with a potentially hefty price if you’re not focused on staying secure when connecting to 3rd party WiFi signals. In this post, we’ll discuss the best practices for keeping yourself, and your private data, secure when connecting to public WiFi.

Is Public WiFi Safe?

The short answer is no.

Read More

The OWASP Top 10: Broken Authentication & Session Management

Did you know a whopping 113 million websites contain a security vulnerability? That’s approximately six percent of all websites globally. A website vulnerability is a weakness in website code that cybercriminals can exploit to gain unauthorized access to a site—and a mere one vulnerability has the power to impact over 1,000 pages on a single website.

Let’s talk about one of the most common types of vulnerabilities on the OWASP Top 10: broken authentication & session management. Simply stated, broken authentication & session management allows a cybercriminal to steal a user’s login data, or forge session data, such as cookies, to gain unauthorized access to websites.

Read More

Decoding Security 125: Hack The Planet

Decoding Security’s most recent episode, Cryptocurrency 101, brought insight into the elusive digital trend of cryptocurrency. Well, it is once again making headlines. Earlier this month, a 20-year old California college student was arrested for stealing over $5M in Bitcoin and other cryptocurrencies by hijacking more than 40 cell phone numbers. Also making cybersecurity news, inmates from five different Idaho Department of Correction facilities hacked tablets given to them for email, music, and games. By exploiting a vulnerability in the tablet’s software, they collected nearly $225,000 worth of credits to purchase various games and eBooks.

Read More

Page 1 of 2