When it comes to choosing organizations to share your personal data with, it can often feel like your options are few and far between. This is because many of the services we use (such as healthcare) require the consenting exchange of personal data. However, just because your data must be…
With the overwhelming number of bad actors looking to profit off your personal information, it can often feel like there is no way to protect your data privacy. However, just because you are a target by cybercriminals does not mean that you cannot take proactive steps to guard against attacks.…
Responsible for securing institutions, all the way from colleges to banks, multi-factor authentication is a layered approach to securing individuals’ data. Yet despite its importance, many users do not understand the principles behind multi-factor authentication or how it differs from the ubiquitous two-factor identification. In this episode, we will discuss…
With the Cambridge Analytica scandal of 2016, the role of voter information was suddenly thrust into the political spotlight. In the years since, we have become increasingly aware of the ways in which our voter files can be manipulated and sold to the highest bidder. But what is a voter…
It’s no secret that the past few years have changed how we view the workplace. With more employees than ever working from home, traditional concerns around privacy have fundamentally changed. So where does that leave you? How can you and your organization stay vigilant as new remote workers create new…
How much information is too much information to share when experiencing a public safety emergency? When communicating with a call center, it can be easy to forget critical information in the heat of the moment. But what if you could proactively share that information with operators in advance of emergencies?…
Biometrics measure users’ physical characteristics to verify their identity. Biometrics may be physiological traits, such as fingerprints and eyes, or behavioral characteristics, such as the unique way you’d complete a security-authentication puzzle. They can be more secure than simply using passwords, but they are not immune to privacy and security…
There are positive benefits to be obtained from being connected to others via social media, but there is a downside as well. We will examine the negative effects that may be experienced by both adults and children from exposure to social media and the unrealistic expectations that can develop. Expert:…
Does keeping yourself safe online seem like an overwhelming task? It seems that there are so many things you have to remember and do. But what if you could master cybersecurity in simple steps? In this episode we will share some tiny changes you can make to greatly increase your…
The idea of removing all traces of yourself from the internet can be appealing, but how would you do it? Is it even possible? We will discuss the steps to erase or reduce your digital footprint, from minimizing your digital footprint to invoking the “nuclear option.” Expert: Bruce R. Mendelsohn…