Sorry, you need to enable JavaScript to visit this website.

Blog

January 11, 2018
Comments [0]

The Winter Olympics in Pyeongchang, South Korea start next month and hackers are using the pretext of the games to launch phishing attacks featuring custom malware that, if downloaded, allows an attacker to take control of a device.

... Read More
January 2, 2018
Comments [0]

While there are a thousand resolution-worthy action items out there, the time is always now for the things that need to change in our lives. Never were truer words spoken when it comes to our potential vulnerability to hackers.

The number of breaches and the granular nature of the data exposed in those attacks over the past year are both unprecedented. The Equifax breach alone included...

Read More
December 12, 2017
Comments [0]

Scammers make a killing during the holiday season. While you spend your time thinking of ways to bring holiday joy to others, they spend their time thinking up ways to steal from you. The saddest part about this is that the ghosts of Christmases past keep visiting Christmas present.

With that, I give you this year’s 12 scams of Christmas.

The Gift Card Scam

While definitely a ghost of...

Read More
December 7, 2017
Comments [0]

The Supreme Court is hearing a case this month, Carpenter v. the United States, that represents an opportunity for the country to move in the right direction on privacy. It’s only fitting that a conviction for a series of armed robberies involving the theft of smartphones may determine the way investigators and prosecutors can use cellphone data in the future.

Timothy Ivory Carpenter was convicted of planning, supplying guns...

Read More
December 4, 2017
Comments [0]

News that Uber got hacked and 57 million records were compromised may not seem like an overt threat after this year’s constant mega breaches—but it is. A recent studysuggests that even something as “harmless” as a breach involving names, phone numbers, and email addresses can...

Read More
November 27, 2017
Comments [0]

Keeping up with news alerts about cybersecurity flaws in consumer electronics is a lot like picking up spilled jelly beans one at a time with a plumber’s wrench. Even if you figure out how to do it and have endless patience, a few will skitter out of sight.

Assume for the moment that, unlike most people, you think a lot about cybersecurity and you do your homework before buying a connected device. (I know. This is a truly...

Read More
November 17, 2017
Comments [0]

How would you feel if the digital “you” were deleted? The common wisdom in cybersecurity circles is that if you think it can’t happen to you, it probably will. Consider Mat Honan’s story.

“First my Google account was taken over, then deleted,” Honan wrote. “Next my Twitter account was compromised, and used as a platform to...

Read More
November 13, 2017
Comments [0]

A recent Google study found that phishing exploits are far more likely to be the cause of account takeovers than the information compromised by data breach or malware.

The study, “Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials...

Read More
November 10, 2017
Comments [0]

If a shady looking character told you to give him pictures of yourself naked, would you? How about a video? What if he told you that it was for your own good? Even if you have less sense than one of the rocks in Kim Jong-un’s head, you wouldn’t do it.

Now what if Facebook asked you for nudes? According to The Verge, the social media...

Read More
November 3, 2017
Comments [0]

Did members of the royal family go under the knife at an upscale London plastic surgery clinic? A recent hack at London Bridge Plastic Surgery may reveal the answer to that—and many other questions you never thought to ask.

Setting aside the obvious follow-up questions (Do you care? Is it any of your...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started