phishing
Are the social media platforms you use secure?
Do you know the world’s top five most popular social media platforms? Did you know that 59% of people worldwide use social media in some form? It’s highly likely that you’re one of them, connecting with friends and family on your preferred platform. Facebook Did you know that Facebook has a plethora of settings that […]
Are YOU an Insider Threat?
It’s important to be mindful that unintentional harm can be caused by those who have access to private information. It’s possible to unwittingly become an insider threat to your organization, even without malicious intent.
Don’t Let Cyber Criminals Outsmart You: How to Keep Your Defenses Up to Date!
As threats from cyber criminals increase, cyber defense practices need to improve to battle the threat. If you know there is a threat of someone stealing your car, you lock it or park it in your garage. Maybe even put an alarm on it or use a system like LoJack in case it is stolen […]
Physical Security is Cyber Security
Cyber security is not just about the technology tools on your computer and networks. It also involves physical security. A cyber criminal can break into your system via a hacked password or a phishing email, but it can be even easier to steal your laptop, tablet, or cell phone, especially if you don’t have those […]
Why You Need to Secure Your Offboarding Process: The Risks and Cyber Security Best Practices for Human Resources
What’s offboarding, and what does it have to do with cyber security best practices for human resources? When someone leaves your organization, hopefully, it is on good terms. However, sometimes it’s just better for you that they are leaving. Maybe the decision for their departure was one-sided. Regardless of the circumstances, whether it is a […]