Search results: "VPN"

public-wifi-security

How to Stay Secure on Public WiFi

As the digital workforce continues to expand, more people are dependent on public WiFi than ever before. Whether it’s the local coffee shop or co-working space, the availability of an internet connection wherever we go has helped foster a growing segment of remote employees.

However, that convenience can come with a potentially hefty price if you’re not focused on staying secure when connecting to 3rd party WiFi signals. In this post, we’ll discuss the best practices for keeping yourself, and your private data, secure when connecting to public WiFi.

Is Public WiFi Safe?

The short answer is no.

Read More

The OWASP Top 10: Broken Authentication & Session Management

Did you know a whopping 113 million websites contain a security vulnerability? That’s approximately six percent of all websites globally. A website vulnerability is a weakness in website code that cybercriminals can exploit to gain unauthorized access to a site—and a mere one vulnerability has the power to impact over 1,000 pages on a single website.

Let’s talk about one of the most common types of vulnerabilities on the OWASP Top 10: broken authentication & session management. Simply stated, broken authentication & session management allows a cybercriminal to steal a user’s login data, or forge session data, such as cookies, to gain unauthorized access to websites.

Read More

Decoding Security 125: Hack The Planet

Decoding Security’s most recent episode, Cryptocurrency 101, brought insight into the elusive digital trend of cryptocurrency. Well, it is once again making headlines. Earlier this month, a 20-year old California college student was arrested for stealing over $5M in Bitcoin and other cryptocurrencies by hijacking more than 40 cell phone numbers. Also making cybersecurity news, inmates from five different Idaho Department of Correction facilities hacked tablets given to them for email, music, and games. By exploiting a vulnerability in the tablet’s software, they collected nearly $225,000 worth of credits to purchase various games and eBooks.

Read More

Decoding Security 124: Cryptocurrency 101

Many consider cryptocurrency to be the future of money since it eliminates disclosing personal financial information when purchasing goods and services online. So, what do you need to know? Security Analysts Jessica Ortega and Ramuel Gall highlight information you need to know about cryptocurrency and cryptojacking as you listen in this week.

Read More

Decoding Security 122: Shut The Front Door

We continue to hear about cyberattacks and data breaches around the world. Last week, the European retailer, Dixons Carphone, admitted to a huge data breach involving 5.9 million credit cards and 1.2 million personal data records. Meanwhile in the United States, net neutrality has officially been repealed. The rules that required internet service providers to offer equal access to all web content are no longer in effect as of June 11, 2018.

Read More

security research

What is Cybersecurity?

As high-profile data breaches, such as Equifax, continue to dominate headlines,  the topic of cybersecurity–or lack thereof–has commanded greater attention. The word ‘cybersecurity’ has become the media’s latest buzzword…and for good reason. New research reveals that websites experience 63 attacks per day, per website on average–this is an upsurge from the reported 22 attacks per day in 2016.

It has become clear that regardless of a company’s size or industry, data breaches are inevitable. That said, it’s important to fully understand what cybersecurity is, as well as the different types of cybersecurity, so you can protect your business, personal information, and stay informed with what’s happening in the industry.

Read More

law firm cyber security

Identifying Law Firm Website Vulnerabilities

“Law firms are tremendous concentrations of really critical, private information. Infiltrating those computer systems is a really optimal way to obtain economic and personal information,” a statement on the state of security for law firms by Bradford Bleier, unit chief of FBI cyber division.

Every day, law firms manage sensitive information for their clients, including mergers and acquisitions, investments, business strategies and other intellectual property. This has made them a prime target for phishing and cyberattacks. In fact, Cisco’s 2015 Annual Security Report named law firms as the seventh highest target for cybercriminals. October is Cybersecurity Awareness Month, which is why now, more than ever, it is necessary to identify and resolve vulnerabilities within your firm.

Read More

National Cyber Security Awareness Month – What it Really Means for WordPress Users

It should come as no surprise that every day we’re immersed in the complexities of cyber security. It’s our business and also our passion. Since October is National Cyber Security Awareness month (NCSAM), we thought it would be fitting to write a bit about the overall subject of cyber security and how that applies to WordPress website owners.

Read More

Security Tips for Travelers & Event Goers

Large scale events, whether in sports or music, take a host of people to make sure things run smoothly. However, making sure things go smoothly is not limited to the organizers. Bigger events that draw crowds of enthusiasts and supporters from across the globe can also, unfortunately, draw in some from the criminal element. It is important to apply the lessons learned from past experiences and breaches to our daily activities. Attendees of any large events should remain vigilant by implementing these tips to help protect their information on site.

Read More

11 Cybersecurity Suggestions for the Traveling Executive

security suggestionsGoing on vacation or traveling for business? One thing you can’t forget to take with you is vigilance. Hacking is a global enterprise and there are all kinds of traps and tricks just lying in wait for busy travelers.

Here are some simple tips that could improve your cybersecurity while traveling and help you avoid putting your foot in one of those traps.

Read More

Page 2 of 2