How does Wall Street react to a data breach? We analyzed the historical closing share prices of 25 companies to find out.
This article will help you identify the common characteristics of email scams and provides practical advice on how to avoid it, and report it.
Employment applications can be a privacy nightmare. Thankfully, Employers must follow legal requirements for employment background checks.
Disabling Flash is a common step in securing a computer because Flash is so insecure. There have been 595 vulnerabilities exposed in the last 2 years alone
Credit card fraud is big business both online and offline. This article provides information on how to recognize and protect against credit card scams.
How to comply with the GDPR. An overview of the rules, requirements, processes, and exemptions you need to know to protect customers’ privacy before 2018.
Wannacry might just be the wake-up call your business needs to put a plan in place to avoid ransomware. We list some practical tips every business can use.
Encryption should be a part of your email strategy. This article explains how to use Hushmail to encrypt your email for privacy and security.
We’ve been hiding messages for as long as we’ve been sending messages. This article discusses famous ciphers in history and their role in modern encryption.