Sorry, you need to enable JavaScript to visit this website.

 

 

 

 

 

 

 

Digital Privacy

July 23, 2017
Comments [0]

No matter how many criminal complaints you read, the expression “JV” always sends chills down your spine. But this line, from a complaint filed April 27 in a California federal court, stands out.

“Petersen stated that he recently received via email from JV#1 a video of JV#1’s younger brother…masturbating in a bathroom. Petersen stated that JV#1 told Petersen he had recorded JV#2 without (his) knowledge. Petersen believes JV#2...

Read More
July 15, 2017
Comments [0]

Parenting a tween, teenager or older? Having a talk about cyber security should be near the top of your to-do list. The old advice of keeping the family computer in the living room to monitor your kids’ internet activity is pointless in the age of everywhere-you-go mobile devices.

Here are some do’s and don’ts to keep your child safe and help them make good digital decisions down the road. The lessons you impart now can protect...

Read More
June 30, 2017
Comments [0]

A friend of mine showed up last night at a place we sometimes meet. He looked like Red Sox pitcher Chris Sale after lobbing a game-ending home run to Aaron Judge of the Yankees. He was supposed to have been on a plane to Italy. I asked him what happened.

“We were all set to head out,” he said. “First leg: Rome. But I just canceled our tickets, like, a second ago.”

I asked why.

“Airbnb scam,” he said.

It was supposed to be the perfect trip. He and his wife have a 2...

Read More
June 28, 2017
Comments [0]

In today’s connected world, cyber crime seems to be everywhere—at home, at work and in the devices we carry with us around the clock. Information security threats are more complex, widespread and challenging to address than ever before. And their speed has increased, as new vulnerabilities are discovered and exploited on a daily basis. Organizations and government agencies of all sizes are under attack, putting the personal information of millions of people at...

Read More
June 12, 2017
Comments [0]

Have you ever been on a website and noticed the site owner or another user has written out their email address in some variation of the following?

Name (at) domain dot com

If you wondered if the person was just averse to using symbols, you may be interested to know it’s actually a decent method for reducing unwanted spam emails and protecting yourself from possible phishing scams and even ...

Read More
June 7, 2017
Comments [0]

You may now add Miley Cyrus, Emma Watson and Amanda Seyfried to the pool of celebrities who’ve been hacked and publicly humiliated. No doubt, other high-profile individuals will follow.

It’s a reminder that “high net worth individuals,” or...

Read More
May 18, 2017
Comments [0]

While the writing has been on the wall for a long time, on Friday, May 12, a new strain of ransomware called WannaCrypt, also known as WannaCry, raged like an out-of-control wildfire across Europe and Asia, ultimately impacting computers in 150 countries.

For many affected by this hack, a few hundred dollars in ransom money is a pittance when compared to the cost of hiring someone to attempt the recovery of your files after...

Read More
May 1, 2017
Comments [0]

International business travelers take heed: Starting now, and even more so going forward, you’ll need to carefully consider how your computing devices serve as a conduit to sensitive company data.

This includes everything stored directly on your smartphones and laptops—and everything reachable from your personal computing devices that may be stored in the internet cloud.

Electronic media...

Read More
May 1, 2017
Comments [0]

At first glance, internet-connected dolls, robots or other “smart” devices that can interact with your children may seem really cool. After all, your children already talk to their toys, right? Well how do you feel about a hacker listening into everything they say to a doll?

Suddenly the toys go from cool to creepy.

The truth is that beneath the shiny surface of smart toys there is a lot going on that could put your...

Read More
April 4, 2017
Comments [0]

Travelers are facing more privacy risks as domestic and foreign governments take a greater interest in social media accounts and require devices to be stowed in checked luggage.

Fortunately there are a number of steps travelers can take to protect their rights and privacy. This Personal Tech Column from The New York Times offers seven...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started