2016

September 19, 2016
Comments [0]

You’re busy, so I’ll say this fast and loud: DON’T OPEN UNEXPECTED ZIP FILES THAT ARRIVE AS EMAIL ATTACHMENTS. Suddenly, there are a lot of them around.

That advice is nearly as old as email, but as they say, everything old is new again. And the internet is newly awash in spam sending out booby-trapped zip file attachments. My inbox has seen a steady trickle of the stuff for the past couple of months, but I didn’t think much of...

Read More
September 19, 2016
Comments [0]

I knew going into this adventure that I was dealing with a scam artist who was trying to cheat people out of their money by tugging at their puppy-loving heartstrings. See, I’d written a piece about this scam just a couple of weeks ago after a woman in San Diego almost fell prey to it.

While researching that story, I decided to send a text to...

Read More
September 16, 2016
Comments [0]

 

Whether you are hoping we can “Make America Great Again,” working tirelessly for those who say that we are “Stronger Together,” or simply trying to make it through another day, it is highly likely that Christmas is the furthest thing from your thoughts right now.

But with only 54 days ‘till Election Day, I can already tell you what’s going to happen, and it’s not going to be pretty. I’m not talking about the continuing...

Read More
September 15, 2016
Comments [0]

Register now to discover how your financial institution can minimize data breach threats—and attract and retain customers—with the right planning.

Combating Cyber and Breach Threats for Financial Services LeadersTuesday, Sept. 2711:00 a.m. PT, 12 p.m. MT, 1 p.m. CT, and 2:00 p.m. ET

Data breaches...

Read More
September 12, 2016
Comments [0]

The most active players in the fledgling but fast-growing cyber insurance market are hustling to differentiate themselves.

The early adopters and innovators are doing so by accelerating the promotion of value-added services—tools and systems that can help companies improve their security postures and thus reduce the likelihood of ever filing a cyber damages claim.

As more businesses look to...

Read More
September 9, 2016
Comments [0]

Flash quiz: What tool do humans use most often for sharing, collaborating, coordinating and archiving? Answer: Email.

And precisely because consumers and companies continue to rely so heavily on email, cyber criminals relentlessly exploit email as a favorite attack vector. Thus spear phishing remains the primary way intruders initiate Advanced Persistent Threat (APT) attacks.

Related...

Read More
September 9, 2016
Comments [0]

Another day, another reminder that companies don’t really have to abide by promises to not share your personal information. They have a big “but” in their contracts.

WhatsApp and Facebook have made this clear. We’ll get to that in a moment.

Most recently, millions of Sports Authority customers began receiving notices that their email addresses and other data were about to be transferred to...

Read More
September 8, 2016
Comments [0]

Identity theft and countless other scams are often among the first life lessons learned by newly minted college students. As summer draws to a close, members of the Class of 2020 face an unimaginable number of potential pitfalls. Be prepared to meet the specific challenges ahead.

Most incoming college students will at some point find themselves feeling overwhelmed by their newfound freedom. With the...

Read More
September 3, 2016
Comments [0]

By Christine Giordano

Working as a freelancer, gig worker or 1099 employee over the internet can sometimes be tricky. You want the work, but never want to fall for a scam or work for a company that won’t pay you.

When I started working as a freelance writer, I crafted what I hoped would be the ultimate...

Read More
September 1, 2016
Comments [0]

Hollywood and news media will have you think of cyber criminals as an innovative lot, coming up with new, sophisticated ways to steal data that are just beyond the reach of security best practices.

But the reality is much more mundane. More often than not they are exploiting vulnerabilities that are well-known, according to the 2016 Verizon Data Breach Investigations Report.  And the compromise of business...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started