What is sandboxing and how to sandbox a program
By in Information Security, on March 2, 2018 at 6:10 pm
What is sandboxing and how to sandbox a program

Sandboxing computer programs keeps them separated from each other which prevents the spread of malware and makes systems more stable.

Beware of this very convincing IRS tax return scam in 2018
By in Information Security, on February 20, 2018 at 9:21 am
Beware of this very convincing IRS tax return scam in 2018

If a collection agent calls demanding money you received in this year’s tax return, you might be the target of an IRS scam.

What is a botnet and how to avoid being part of one
By in Information Security, on February 15, 2018 at 2:04 pm
What is a botnet and how to avoid being part of one

  A botnet is a group of computers controlled by a hacker. The method of control combines two key advantages for the hacker. First, it amplifies the damage they can do, and second, the attacks don’t originate from their own computer, which makes them nearly impossible to trace. If your computer is infected by malware, […]

What is smishing, and how can it be avoided?
By in Information Security, on January 23, 2018 at 9:59 pm
What is smishing, and how can it be avoided?

Have you been receiving suspicious text messages? You may be the target of smishing, or text message (SMS) phishing. We clear up everything you need to know about smishing, and how to block and report phone scam attempts.

Online dating and romance scams: How to spot and avoid them
By in Information Security, on December 21, 2017 at 7:33 pm
Online dating and romance scams: How to spot and avoid them

Finding love online is becoming more and more commonplace. In fact, you probably know at least one couple who met online. However, the rise in popularity of online dating has resulted in a dramatic increase in the number of romance scams taking place. Dating and romance scams are nothing new, but with so many people […]

30+ free tools to improve security for your website and your visitors
By in Information Security, on December 20, 2017 at 12:37 pm
30+ free tools to improve security for your website and your visitors

Cyberattacks are a daily occurrence and the concomitant costs for organizations are escalating. However, you can mitigate cyber disaster with free website security tools that will help you to identify website vulnerabilities and keep your visitors safe, or rather … safer.  One would think large enterprises have the means and opportunity to monitor their applications […]

BYOD security: What are the risks and how can they be mitigated?
By in Information Security, on November 5, 2017 at 2:28 pm
BYOD security: What are the risks and how can they be mitigated?

BYOD, and remote devices in general, carry a risk of data loss and data leakage. Here are some pointers on formulating a strategy to mitigate those risks.

How to recognize secure sites and avoid fake, scam or fraudulent websites
By in Information Security, on November 1, 2017 at 3:04 pm
How to recognize secure sites and avoid fake, scam or fraudulent websites

Cyber crime is a quickly growing problem. Don’t passively let yourself become a victim. Here’s how to spot and avoid fake, scam or fraudulent websites.

The jargon-free guide to computer and internet security
By in Information Security, on October 28, 2017 at 4:08 pm
The jargon-free guide to computer and internet security

In this article we’ll break out the most important aspects of internet safety and security into bite-sized chunks and offer some practical advice on each.

Cybersecurity institutes, associations, and events around the world
By in Information Security, on October 26, 2017 at 8:30 pm
Cybersecurity institutes, associations, and events around the world

There are cybersecurity institutes and events dotted around the globe. Find a list of them here along with details of their objectives.

Page 3 of 10