Search Results for
BEC
How the Internet of Things will change cybersecurity as we know it
Analysts have been saying for a long time that the Internet of Things (IoT) is about to become a fundamental element in the transformation…
5 security measures that experts follow (and so should you!)
When you’re watching a movie and you see the typical computer screen filled with green coding (you know the type, rows of 1s and 0s)…
If “Google” SMS you warning someone accessed your account, be careful!
With the Smartphone revolution and the wide choice of free messaging services available, receiving an SMS is definitely an unusual occurrence. Instead of being a…
67% of apps for infants are gathering and storing private information
The debate over the convenience of getting a mobile device for your children, or the age at which they should have one, is nothing…
4 common errors that businesses make after a data breach
A few months ago on this blog we raised the basic points that you should think about when confronted with a cyberattack. Unfortunately the general…
As Adobe Flash gets phased out, we certainly won’t be pining after it
This September 1 didn’t just bring with it the usual back-to-school (or work!) rush that we see every year, but also the ushering in of…
Social Engineering techniques – What they are and How businesses can avoid them
Although it may be tempting to imagine hackers as being shy and socially inept types, whose only human interaction is via their computers, this…