Botnets flood your web servers and gateways, filling up their queues and blocking legitimate access. Find how to stop them.
By Stephen Cooper
in Data Privacy Management
on February 26, 2024
The system accounts of your customers and employees are points of vulnerability that need to be protected. Find out how account takeover happens and how to prevent it.
By Stephen Cooper
in Net Admin
on August 17, 2023
Businesses continue to face an increasing range of sophisticated cyber threats. Find out about the trends we’re observing in 2021 and beyond and how to protect your business against the most serious cyber hazards.
By Aimee O'Driscoll
in Information Security
on August 4, 2023
Using data from the FBI’s Internet Crime Complaint Center, we analyzed the most common scams and w
By Paul Bischoff
in Scams Studies
on May 5, 2021
We surveyed over 1,000 Americans about their understanding of the cyberattacks on the 2016 president
By Paul Bischoff
in VPN & Privacy
on February 9, 2021
Home Title Lock vs LifeLock – which is the best ID theft protection service in 2022? We’ll help you decide.
By Kyle Schurman
in Identity Theft Protection
on August 15, 2022
By Paul Bischoff
in Identity Theft Protection
on September 27, 2022
Receiving scam calls? Voice phishing, or vishing, is on the rise. In this post, we'll explain what a vishing scam is, how to recognize it, and what you can do to stay safe.
By Sam Cook
in Information Security
on November 24, 2021
We take a look at the 10 most common signs you should be looking out for - signs your identity has b
By Paul Bischoff
in Identity Theft Protection
on July 21, 2019
Medical identity theft involves a thief using your information to receive medical treatment or make a false claim. We explain this growing problem and the steps you can take to protect yourself.
By Aimee O'Driscoll
in Identity Theft Protection
on April 13, 2022