Facial Recognition, Coming Soon to a Store Near You

Smile, you’re on facial recognition camera! A number of retail businesses are now using facial recognition technology, and others are considering it.  In July 2021, digital rights non-profit Fight for the Future launched an initiative to document which retailers are using facial recognition, and which have committed to not employ…

Continue Reading

Avoid Identity Theft While Traveling

As more of us are heading out on trips after extended stay-cations due to the pandemic, we need to remember how to keep our personal information private. The scammers are heading out, too, but they are not on vacation. They are working at getting your money and personal information.  Before…

Continue Reading

Make Cybersecurity Easy with Tiny Habits

Does keeping yourself safe online seem like an overwhelming task? It seems that there are so many things you have to remember and do. But what if you could master cybersecurity in simple steps? In this episode we will share some tiny changes you can make to greatly increase your…

Continue Reading

Are There Laws Against Cyberbullying?

Cyberbullying is bullying that takes place over digital devices like cell phones and computers. It includes sending, posting, or sharing negative, harmful, false, or mean content about someone else in order to harass or embarrass them. The results of cyberbullying can be tragic, as some victims are so distressed that…

Continue Reading

Should Passwords Be Complicated? Or Just Long?

You know the routine: you set up a new account and you are asked for a password. The password you choose must be suitably complex or you can let the site choose a password for you, full of numbers and special characters and impossible to remember. What if you were…

Continue Reading

Best Practices from the NSA to Protect Your Mobile Devices

Can keeping your mobile device safe from hackers be as simple as turning it off then turning it back on? Well, not completely, but that is one of the things the National Security Agency (NSA) suggests to thwart the bad guys. “This is all about imposing cost on these malicious…

Continue Reading

Apple’s New Anti-Tracking Privacy Initiative

In an update to iOS 14, Apple now requires all apps to ask for explicit permission to track users across apps and websites. This means that instead of tracking only being disclosed in the terms of service that most users never read, there is now a message that appears (when…

Continue Reading

Can You Disappear From the Internet?

The idea of removing all traces of yourself from the internet can be appealing, but how would you do it? Is it even possible? We will discuss the steps to erase or reduce your digital footprint, from minimizing your digital footprint to invoking the “nuclear option.” Expert: Bruce R. Mendelsohn…

Continue Reading

Romancing the Scam

Continue Reading

Malware is Still Going Strong

Continue Reading

FEATURED PODCAST: SOCIAL ENGINEERING: ARE YOU THE WEAKEST LINK IN YOUR SECURITY?

Social engineering attacks manipulate users into giving up information wanted by the hackers. They often involve email or other communication to invoke urgency, fear or other emotions in the victim, leading them to reveal sensitive information, click a malicious link, or open a malicious file. Because social engineering involves a human element, it can be difficult to prevent these kinds of attacks. The best hope of protecting yourself, your family and your company from social engineering attacks is to be aware of how they work and educate yourself and other users on how to avoid becoming a victim. In this interview, we discuss how to recognize a possible social engineering scam and how to deal with them.

Listen Now