PHI is one of the most valuable types of data on the dark web. It can be used for a variety of illegal purposes — which makes it incredibly lucrative data to have.
Category: Cybersecurity
October is a dedicated time to remind yourself, and others in your workplace, about the importance of cybersecurity whilst promoting good cybersecurity practices at work and home. Cybersecurity Awareness Month reminds everyone that they have a role to play in protecting themselves and their data from cyber threats!
Children are particularly vulnerable to data privacy violations. Thankfully, your local and/or federal government probably have some laws to protect your kids!
Samsung has allegedly been misusing their customers’ biometric data. They just got strapped with a $4M arbitration fee to over 35K customers in a class action lawsuit.
There are two ways you might get new applications delivered to your system: On-premise and software as a service.
What are the benefits? What are the downsides? Find out inside.
Unlike a simple typo when you’re messaging your friends, typosquatting is much more sinister.
Hacking isn’t always a malicious attempt to prey on your systems and data. Sometimes it can be used for good!
Would you trust a hacker to break into your system?
An Iranian hacker group is going after Microsoft Exchange Servers and their vulnerability, ProxyLogon, to exploit target systems. The hackers are calling themselves Ballistic Bobcat.
Have you heard about the attack on MGM Resorts International? The cyberattack is a reminder of the growing threat of ransomware!
Cookies are used to remember your preferences and track your browsing activity across different websites. However, they can also pose a threat to your data privacy.