How can we keep our accounts and data private if we don’t know when a breach has occurred? If you don’t know YOUR reporting requirements, now is the time to found out!
Author: Alex Alper
Just as 2022 ended, Twitter experienced a data breach that affected nearly 90% of the website’s userbase. Then they published 235M user records online.
They’ve stolen NFTs. They can use your devices to illegally mine for currency. Well, cybercriminals are also targeting cryptocurrency exchanges.
Don’t fall headfirst into 2023 without any preparation! It’s never too early to start thinking about what cybersecurity threats and defenses will make headlines next year.
One of the ways that security experts are working to consolidate best practices to fight off threat actors is called secure access service edge. What the heck is SASE?
It’s not altogether safe to use a shared or public computer! You can, however, mitigate the risks.
Knowing your privacy rights helps you enforce these boundaries more comfortably. The better you understand your PHI, the better you can manage it. Even if your healthcare providers do their very best, though, is your data really protected on their systems?
What do you do when the credit monitoring company is the one who got hacked, and whose database was exposed?
Would it surprise you to hear that MFA isn’t the locked-up safe that you thought it was?
Over the weekend, a threat actor who calls themselves UberLeaks got in to the database by first infiltrating Teqtivity.