Source Hashing – Why it’s Important January 18, 2018March 12, 2018Privacy Tech Team You might have heard about a data breach where password files were stolen, or wondered how your information is kept secure online. One
Dining and Data Breaches January 8, 2018March 12, 2018Privacy Tech Team Americans love going out to eat, and with the serious profit potential for stolen records, it’s no wonder that restaurants are increasingly targeted
Real World Cybersecurity November 10, 2017March 12, 2018Privacy Tech Team Hollywood often portrays cybersecurity as something exciting and glamorous, with a hero rushing in to rescue a computer network just in the nick
Critical Infrastructure at Risk November 2, 2017March 12, 2018Privacy Tech Team It seems hardly a week goes by without a report about some system being hacked. Hospital breaches, cyberwarfare, ransomware attacks – the list
2FA – What is it? October 18, 2017March 12, 2018Privacy Tech Team With the endless cycle of news about breaches and hacked accounts, many people start to wonder how they can better protect their digital
Source: Blue Coat Photos Insider Threats: a Growing Menace October 14, 2017March 12, 2018Privacy Tech Team We’ve seen data breaches due to misconfigured databases, technical malfunctions, and a myriad of other causes including accidental disclosure or theft. Data breaches
The Future of Cyber War September 30, 2017March 12, 2018Privacy Tech Team In 2010, the world was introduced to what was possibly the first incident involving cyberwarfare. The Stuxnet malware had infected Iranian nuclear
TorFlow The Dark Net September 26, 2017March 12, 2018Privacy Tech Team When you think of the internet, what do think of? For many people, the internet conjures thoughts of familiar sites such as Google,
Source: Blue Coat Photos Rating Consumer Security September 20, 2017March 12, 2018Privacy Tech Team Ever wish you could know how secure a device is before your purchase it? In a major step forward, Consumer Reports, the popular
Neutralize Cyber Crimes Using Network Pen Testing June 30, 2017March 12, 2018Privacy Tech Team by Jack Kelly Cyber-attacks in the form of hacking or malicious viruses are becoming common these days. Such attacks may cause damage to