Data Security

May 25, 2016
Comments [0]

By Pierluigi Stella

The sheer idea of hacking into a network and stealing data is based on being stealthy. Hackers are really good at that.

The revelation last week that the password breach first reported by LinkedIn in 2012 was, in fact, much bigger than anyone thought, proves the point.

Related podcast:...

Read More
May 23, 2016
Comments [0]

 

Quickly, what was your LinkedIn password in 2012? OK, now think of every password you have set at every service you use and make sure that LinkedIn password isn’t reused anywhere.

If ever you needed a reminder not to reuse passwords, here it is. We knew that LinkedIn got hacked in 2012, but at the time, we thought “only” 6.5 million passwords had been taken. Now, we learn the real figure...

Read More
April 19, 2016
Comments [0]

 

By James LaDue

The internet is a strange and dangerous place, especially when it comes to your personal information. With all the hackers and scammers out there, protecting your information in cyberspace is much more of a challenge these days than simply demonstrating common sense. And you can’t just rely on your bank’s internet security measures anymore.

Cyber-thieves have now found...

Read More
April 15, 2016
Comments [0]

The only sure thing in the world of information security is that there is no such thing as a failsafe solution. It’s crucial not only to keep abreast of the latest threats out there, but to also act as though the mission is to find your way to safety from the middle of a lawless demilitarized zone that’s lousy with enemy snipers.

Sound extreme? Remember that Cold War classic “A Few Good Men” when Colonel Jessup (played by Jack...

Read More
March 27, 2016
Comments [0]

The Privacy XChange Forum just got better.

Register now for a complimentary ticket to the fourth annual privacy event of the year.

PxF4Oct. 16-18, 2016Boulders Resort & Spa

PxF4 promises exciting new speakers, including former C.I.A. employee and whistle-blower Edward Snowden, and...

Read More
March 15, 2016
Comments [0]

Data breaches at large corporations like Sony, Target and Home Depot make headlines. But small businesses are just as vulnerable.

Register now for this free webinar to learn how small businesses have become ideal targets for cyber criminals in search of financial information, consumer data, and intellectual property.

... Read More
March 14, 2016
Comments [0]

Whether you love it, or it makes you want to move south of the border, Donald Trump’s Great Wall of Mexico is an idea whose time has come.

That said, the Republican presidential candidate has a few things wrong.

First, The Donald’s wall is misnamed. It should be called the Great Cyber Wall of America or the American Cyberdome or, at any rate, something denoting a digital information and...

Read More
March 9, 2016
Comments [0]

The next president of the United States will face profound privacy and security challenges.

Wonder how the White House hopefuls fare? CyberScout experts graded the two Democratic candidates and four leading Republican candidates on privacy and security using reference material assembled by Passcode.

Check out this infographic to see who passed and who failed.

For a closer...

Read More
March 8, 2016
Comments [0]

By Todd Weller

Cyber attackers don’t discriminate based on company size. They focus on the value of the data they can steal. This means that most small and midsize businesses face much the same cyber exposures as large enterprises.

But due to cash flow and manpower constraints, SMBs face greater challenges when it comes to securing their networks. Unfortunately, attackers aren’t sympathetic...

Read More
January 25, 2016
Comments [0]

Your Uber account is about 17 times more valuable to a hacker than your credit card credentials, according to a report security company Trend Micro compiled for CNBC. They found that stolen Uber credentials sell for an average of $3.78 per account on underground online...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started