The year 2015 certainly saw its share of unusual technological security breaches, ranging from the Ashley Madison hack to controlling Jeeps from afar. With the ever-growing breadth of technology services and gadgets, the opportunities to exploit them grow as well. These are some of the top security threats for the coming year: [Read more…]
Most of us are more dependent on our smartphones than we’d like to admit, and it can be a crushing blow when our precious jewel that ties us to the rest of the world is stolen. While you certainly know that it’s not the end of the world, there are a few things you can do to make the experience more bearable because it is possible to get your phone back; just don’t panic and do what you can with as little stress as possible. So what to do if your phone is stolen?
Chances are, you have an antivirus program installed on your personal computer. You may not, however, have the same sort of protection for your smartphone. If you don’t, you’re certainly not alone. Being part of a majority, however, doesn’t make the data on your smartphone safe. The same threats that lurk in cyber land can attack your phone as easily as a personal computer, but there isn’t a lot of attention being given in the media and other venues about viruses on smartphones. So, despite that lack of attention, should you install antivirus protection on your smartphone?
One of the newest business technologies is “the cloud,” that more and more people are embracing. It’s an elusive term that is difficult to pin down, and it is precisely that vagueness that inspires fear in those who are considering transferring sensitive business data to it. The cloud; however, isn’t as mystifying as you may think, and, if you use an online data drive or social media, you are already using it. Simply put, the cloud is a network of servers worldwide that are capable of storing information.
Secure access to web services and products is a constant challenge that large and small businesses contend with on a daily basis. For a while, single-factor authentication was used to access protected data, such as bank account information, service applications, and personal information. However, data breaches forced many businesses to add another layer of security through the implementation of a second authentication process or a two-factor authentication.