The “California Effect,” Again

When it comes to privacy law, as California goes, so does the nation. The Golden State is introducing a new child privacy law that could one day become the national standard. Although this legislation will not go into effect until 2024, it is the first in the nation to impose…

Continue Reading

Distributed Denial-of-Service (DDoS) Attacks

2022 has seen its fair share of hacking issues. Due in part to the geopolitical conflict in Ukraine, we have seen attacks skyrocket in number, especially those of the denial-of-service variety (DDoS). In the first quarter of 2022, an all-time high of DDoS attacks were reported by Kaspersky at 91,052.…

Continue Reading

Keeping the Cloud Secure

Despite the fact that the conception of network-based computing (i.e., “cloud computing”) dates back to the 60s, today’s users had to wait until August of 2006 for Google to introduce the term during an industry conference. Since then, cloud computing and storage has gone from a novel idea to a…

Continue Reading

Man-in-the-Middle Attacks

They say if you wait long enough, old ideas are bound to be repacked as new ones. Well, ransomware attacks have been around for more than 30 years, which is why it is no surprise we are experiencing a resurgence in an old form of cyberattacks: man-in-the-middle attacks (MITM). Though…

Continue Reading

Employee Security Out of the Workplace

In the wake of COVID-19, employees have experienced massive expectation shifts from their employers regarding their presence in the workplace. As a result, it is no surprise that workplace security has shifted drastically, as well. With many organizations employing hybrid and work-from-home structures, employees are facing new security concerns while…

Continue Reading

Protecting and Managing Dark Data

Across the technological and marketing landscapes, personal data remains the most valuable asset of any user—that is what makes managing this data so important. There are growing concerns for users and organizations alike for managing and protecting dark (personal) data. Because dark data makes up over half of the data…

Continue Reading

Personal Profiles and Public Safety

How much information is too much information to share when experiencing a public safety emergency? When communicating with a call center, it can be easy to forget critical information in the heat of the moment. But what if you could proactively share that information with operators in advance of emergencies?…

Continue Reading

The Return of Emotet

Whether you’ve heard of Emotet or not, this malware requires your attention. During COVID-19, new life was breathed back into once-forgotten cyberattacks, and the Night King has returned from the dead, more dangerous than ever.  Far removed from its humble origins in 2014 as a banking Trojan, Emotet is now…

Continue Reading

A Future With No More Cookies

Whether we’re ready for it (or have even heard of it), the ‘cookiepocalypse’ is coming. By the end of 2023, Google and other “tech giants” are planning to end the use of third-party cookies. This massive shift in policy will have an unequivocal effect on user privacy. But as Big…

Continue Reading

Does Securing Your Home Mean Securing Your Privacy?

When it comes to home security, there’s no such thing as overthinking it. Although it may seem like a no-brainer to install a home security camera, using these recording devices is more complicated than it appears. This is because, with certain products, it might be impossible to protect your home…

Continue Reading

Cryptojacking

It wasn’t too long ago that crypto currencies seemed to be an extremely viable method for investing—and even diversifying—your portfolio. But although digital asset prices have taken a tumble, the threat of cryptojacking has remained prevalent. As anyone familiar with digital currency knows, cryptocurrencies work through a digital ledger called…

Continue Reading

The Big Impact of the Discrete Semiconductor Shortage

Due to both the effects of the pandemic as well as other geopolitical events, including the war between Russia and Ukraine, there has been an increased demand and a critical shortage of a tiny-yet-powerful technology: Discrete semiconductors. But as more and more folks are stuck at home, another issue has…

Continue Reading

Is Your Smartphone Secure?

There is no question that in our increasingly tech-driven world, concerns over dangers to our security have never been greater—or more appropriate. The good news is that with increased awareness and common-sense steps, consumers can protect themselves as well as their data. This article will address the dangers of the…

Continue Reading

Cryptocurrency Scams

It seems that everyone is talking about cryptocurrency. Of course, that means the scammers cannot be far behind. Some scams are old ones with a cryptocurrency spin, but others are new and specific to crypto. Popular crypto scams include: “Pig butchering” crypto scam. This is a twist on online dating…

Continue Reading