Why (and How) You Should Be Using Two-Factor Authentication

Two-factor authentication (2FA) adds another level of security, beyond only a password, when you log in to apps and accounts. In this interview we will discuss how 2FA helps to secure your accounts, how it works and why you should use it. Expert: Steve Tcherchian Steve Tcherchian is the Chief…

Continue Reading

Do You Know Where That Cable Has Been?

We all learned as children that we shouldn’t take candy from strangers. It turns out we shouldn’t take charging cables from them either. According to Charles Henderson, Global Managing Partner and Head of X-Force Red at IBM Security, “There are certain things in life that you just don’t borrow. If you…

Continue Reading

What Does HTTPS Mean?

By now many people know that “https” before a web address means that the site is secure. However, they may not understand what “secure” actually means. Even the U.S. government doesn’t seem to fully understand it, as the Census Bureau site includes this false statement: “The https:// ensures that you…

Continue Reading

Census Scams

It’s that time again! Although the Census Bureau conducts more than 130 surveys every year, every ten years they conduct a massive survey to count every person living in the country. And just as surely as we can depend on the decennial count by the Census Bureau, we can trust…

Continue Reading

Online Security When Working from Home

Many employees are working from home to self-isolate during the COVID-19 pandemic. And for some employees and contractors the opportunity to work from home may continue long after the effects of the pandemic have faded away. Although avoiding a commute by working remotely can be convenient, there are security issues…

Continue Reading

Can You Put the DNA Genie Back in the Bottle?

Once you have gotten your DNA tested, is it possible to remove your data from the databases in which it is recorded? If you are among the millions of Americans who have sent DNA to genetic testing labs, such as Ancestry.com and 23andMe.com, you may be wondering what you can…

Continue Reading

COVID-19 Scams

Every newsworthy event becomes a hook for scammers who want to get our money or our personal information, and scammers have eagerly taken advantage of the confusion, concern and even panic surrounding the Coronavirus (COVID-19) pandemic. The scams being put forth are similar to past frauds, but with a Coronavirus…

Continue Reading

Keeping Kids Safe from Online Predators

Most children spend hours every day online. Much of that time is spent messaging with others. Gaming and social media apps provide a way for children to connect with others, but sometimes those others are not what they appear to be. In this podcast we discuss where predators seek children…

Continue Reading

Phishing Scheme Gives Bad Guys Access to Your Cloud Data

As online users become more sophisticated, hackers are becoming more sophisticated as well. Early phishing attacks relied on users clicking links without paying attention to where the links took them. For example, a hacker would create a page that looked just like the PayPal login page, but it was actually…

Continue Reading

What Does Google Know About You?

How much does Google know about you? Probably a lot more than you realize. According to the founder of search engine DuckDuckGo, even if you do not directly use Google products, their trackers are found on 75% of the top million websites. “(Google isn’t) really a search company anymore –…

Continue Reading

FEATURED PODCAST: SOCIAL ENGINEERING: ARE YOU THE WEAKEST LINK IN YOUR SECURITY?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, it can be difficult to prevent these kinds of attacks. The best hope of protecting yourself, your family and your company from social engineering attacks is to be aware of how they work and educate yourself and other users on how to avoid becoming a victim. In this interview, we discuss how to recognize a possible social engineering scam and how to deal with them.

Listen Now