Home > Technology > Security > Page 7

Security

The History of Phishing and How to Remain Protected

Although the earliest forms of electronic mail trace back to 1965, e-mail was never intended to be secure. That is, however, because there was never anything to secure email from. The service of electronic mail…

1.5% of Web Logins Use Breached Credentials

Web applications are some of the most powerful tools an organization can have, but they also create a massive threat surface for the organization. Web apps are designed to expose protected functionality to authorized users…

3 Surefire Tips for Identity Theft Guards and Fraud Protection

Few people realize the amount of information available online or in electronic data caches that reveal specific details about our lives and financial transactions. Although you may feel that some of the more intimate details,…

The Future of WiFi

In 1990, the World Wide Web created by Tim Berners-Lee became the beginning of the Internet as we know it today. Popularized among the public, the system of accessing information and data online through websites…

Hack-Proof Your Small Business from Cyber Attacks Without Breaking Your Wallet

If you’re a small business, taking a comprehensive approach to cybersecurity may seem like something that can wait until your business grows. You might assume hackers won’t bother with you. Don’t they focus on big…

How IoT-Connected Products Simplify Life But Create Nefarious Security Issues

Get this: Data-security researchers at Indiana University, probing the hacking vulnerabilities of an Internet-connected Crock-Pot, easily took control of the device and other devices that share its Wi-Fi router—but they have found no risk of…

How Can You Tell if Your Customers’ Data is Safe?

If you’re like most businesses, you collect at least some customer data (whether you realize it or not). That might be an intensive process, drawing data from the apps your customers use in an effort…

Watch These 5 Things to Comply with Data Protection Regulations

Compliance with data protection regulations can be a complicated, heavy load to manage, especially for small to mid-sized businesses. For example, Verizon’s 2018 Payment Security Report, shows that, although improving, only 52% of companies meet full…

Holistic Security: The Most Effective Strategy for SMBs

The fight against cybercrime is constant—as soon as new security measures are established, hackers are working to counteract them. Whenever a new tool or update is released, it introduces other vulnerabilities that could potentially be…

You Were Phished: What Happens Next?

It’s safe to say a majority of email users, particularly those part of a small to medium sized business, have been targeted by phishing scams. Everyone around the world engaging in online activity is a…

More from Security

Back to Parent Category

Top Articles in This Category

    Stay up to date with