2017

July 6, 2017
Comments [0]

Do you know how often you use artificial intelligence tools every day?

Many people associate artificial intelligence or “AI” with robots and science fiction movies, but the reality is that if you use a cell phone, digital assistant or a computer, then you are likely already interacting with AI technology.

The point of most AI technologies is to make your life easier. To do that, they “listen...

Read More
July 6, 2017
Comments [0]

Preet Bharara, a former federal prosecutor known for fighting cyber crime, will speak at the 2017 Privacy XChange Forum Oct. 22-24 in Lake Las Vegas, Nevada.

He joins an incredible lineup of speakers, including intelligence expert Malcolm Nance and cyber security guru Bruce Schneier at the Privacy XChange Forum (PxF). Now in its fifth year, the forum brings together cyber security and industry leaders from around the world to shape the cyber security agenda for the year....

Read More
June 30, 2017
Comments [0]

A friend of mine showed up last night at a place we sometimes meet. He looked like Red Sox pitcher Chris Sale after lobbing a game-ending home run to Aaron Judge of the Yankees. He was supposed to have been on a plane to Italy. I asked him what happened.

“We were all set to head out,” he said. “First leg: Rome. But I just canceled our tickets, like, a second ago.”

I asked why.

“Airbnb scam,” he said.

It was supposed to be the perfect trip. He and his wife have a 2...

Read More
June 28, 2017
Comments [0]

In today’s connected world, cyber crime seems to be everywhere—at home, at work and in the devices we carry with us around the clock. Information security threats are more complex, widespread and challenging to address than ever before. And their speed has increased, as new vulnerabilities are discovered and exploited on a daily basis. Organizations and government agencies of all sizes are under attack, putting the personal information of millions of people at...

Read More
June 21, 2017
Comments [0]

Summer’s here and the time is right for getting hacked or worse, having the contents of your computer held hostage by ransomware. For a couple of carefree and extreme data-consuming months, kids everywhere will be doing whatever they want online even if you’ve tried to control them.

In other words, be very afraid.

... Read More
June 15, 2017
Comments [0]

Weddings require many important decisions and the wrong call can mean the difference between an unforgettable wonderful day and a day that makes you angry every time you think about it.

The often unreasonably high expectations of families and friends and at least one spouse-to-be only makes matters more fraught. With such a high level of stress, it’s only a matter of luck that mistakes don’t get made. Scam artists are counting...

Read More
June 15, 2017
Comments [0]

Your policyholders may not even be aware that their networks are part of the Internet of Things. All it takes is adding any kind of smart device that connects to the internet, such as a baby monitor, TV, virtual assistant, thermostat, security camera or any type of appliance, to their home network. These devices add convenience to our lives—but they are also a convenient way for hackers to gain access to our networks and personal information.

... Read More
June 13, 2017
Comments [0]

More than ever, chief security officers are being held accountable for keeping their business safe. Phishing attacks, data breaches, ransomware and the ever-increasing access by employees to technology and data are driving this accountability. But there’s only so much that technology solutions can do to protect against threats.

What else should organizations do? It turns out that most breaches are the result of an employee...

Read More
June 12, 2017
Comments [0]

Have you ever been on a website and noticed the site owner or another user has written out their email address in some variation of the following?

Name (at) domain dot com

If you wondered if the person was just averse to using symbols, you may be interested to know it’s actually a decent method for reducing unwanted spam emails and protecting yourself from possible phishing scams and even ...

Read More
June 10, 2017
Comments [0]

Researchers agree—health care is now one of the top three targets for cyber attackers. No matter what type of health care facility you work in—a large research hospital, clinic, regional medical center, health insurance company, or a company that provides business or clinical services for health care—the data you work with is worth millions of dollars on the dark web. And attackers can hold a hospital hostage, almost instantly halt operations, and disrupt critical medical processes.

...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started