Articles tagged with: Security

The Convergence of AI and Cybersecurity

Are Artificial Intelligence (AI) and related technologies going to ultimately help us or harm us? It’s a question being debated across news cycles and behind closed doors on Capital Hill as AI technologies continue to be developed and implemented at an unprecedented rate, with little legislation, controls, or governance. And the market is booming. Goldman [ Read More ]

Read More

Protecting Your Digital Life: Cybersecurity Tips While Traveling

In today’s hyper-connected world, travel often means staying connected to the digital realm. Whether you’re traveling for business or leisure, it’s crucial to prioritize cybersecurity to protect your personal and sensitive information from cyber threats. Here are some cybersecurity tips to keep in mind while you’re on the go: Travel As Light As Possible:  Take [ Read More ]

Read More

Multifactor Authentication and why it is important

Many people are seeing more and more services requiring or suggesting the use of multifactor authentication (MFA) for accessing online systems. MFA is a login process that requires multiple methods of authentication to verify a user’s identity. It combines two or more independent credentials to verify a login. The first credential is based on something [ Read More ]

Read More

How to protect your phone or tablet – simple steps for Android and iOS security.

Phones and tablets have gone from being cool gadgets to our partners in crime, helping us keep in touch with our people, hoarding our secrets, and occasionally granting us entry into the mystical realm of work networks and services. They’re like little digital treasure chests of personal data. But, just like we’d lock up our [ Read More ]

Read More

Updating Computer Software

According to the Cybersecurity and Infrastructure Security Agency, users should do three things regarding computer updates. First, turn on automatic updates. This downloads important software updates in the background while you work. Second, watch for notifications. The update will let the user know when the updates are ready to install. Third, users should install updates [ Read More ]

Read More

Types of Phishing Attacks

A cyberscammer will use a variety of tactics and ploys to disguise themself as trustworthy in an effort to gain access to information. As technologies evolve, so does the scammer’s ability to influence your decision about their trustworthiness. Phishing is a common attack method used by scammers. There are different types of phishing attacks: Email [ Read More ]

Read More

Why is Cybersecurity Awareness Important?

This article delves into the reasons why cybersecurity awareness is not just an option, but is very important for individuals, organizations, and society. Protection of Personal Data According to the U.S. Federal Trade Commission (FTC), identity theft remains one of the top consumer complaints. In 2020, the FTC received 1.4 million fraud reports, with identity [ Read More ]

Read More

Computer Viruses and Malware: Cybersecurity Awareness Month 2022

Most people who use computers have heard the terms “malware” and “computer viruses”, but what are they? Malware and computer viruses are usually used synonymously but while it’s true that all viruses are malware, not all malware is a computer virus. Malware, short for malicious software, refers to software that is made to be malicious. [ Read More ]

Read More

Multi-factor Authentication

Multi-factor authentication (MFA) is sometimes referred to as two-factor authentication or 2FA. This is a security feature that requires you to present two types of credentials when logging in. These credentials can be something you know (a password for example), something you have (like a smartphone), or something you are (for example a fingerprint or [ Read More ]

Read More

National Cybersecurity Awareness Month 2022: Personal Awareness

Cybersecurity Awareness Month is a great time to reflect on your habits and how you interact with technology over the past year. With this, answers to the following questions can help you focus on keeping your online identity and your data safe. Have you connected to any public Wi-Fi networks over the last year? While [ Read More ]

Read More