BlackCloak’s QR Code Scanner Keeps You Safe by Scanning for Malicious Content
Almost everyone is familiar with QR codes and how they work. But not a lot of people know that “QR” stands for “quick response.” The goal of these helpful barcodes is to make your life more convenient by providing quick access to view a website, perhaps to peruse your favorite ... Read More
How Panacea Smart Solutions Helps Solve Customers’ Problems with Digital Executive Protection
Earlier this year we introduced you to our partner Level Solutions Group. We shared how we’re helping the North Carolina-based systems integrator bring digital executive protection to the data center industry. In this second article in our Partner Spotlight series, we introduce you to IT Services provider Panacea Smart Solutions ... Read More
Microsoft issues warning over malware threat; New York-based healthcare organization discloses data breach
Data breaches aren’t the only way cybercriminals compromise personal information. Malware is another tactic they commonly use as well. In fact, the AV-TEST Institute finds more than 450,000 new pieces of malware and other potentially unwanted applications each day. Cybercriminals will try to disguise their malicious software. They hope that ... Read More
Why High-Access Employees Need Digital Executive Protection
At BlackCloak, we talk about the urgent need for businesses to protect the personal digital lives of executives, Board Members, and high-access employees. For the most part, security teams have come to understand why digital executive protection is a necessity for the C-Suite. With the keys to the corporate kingdom ... Read More
New VPN Service Makes Digital Privacy Protection More Convenient
In conjunction with Black Hat last month, BlackCloak announced the forthcoming rollout of our new VPN (virtual private network) service. The VPN officially rolled out to all members last week. Our VPN can now be conveniently accessed directly from the BlackCloak mobile and desktop applications. If you’ve used our previous ... Read More
Recent Cyber Attacks Confirm Personal Digital Lives are a Risk to Enterprise Security
BlackCloak was founded in large part because of the widening gap between the personal and enterprise cybersecurity and digital privacy protections afforded to business leaders, Board Members, and high-access employees. As we’ve written about extensively, attackers are increasingly attempting to bypass robust corporate security controls by breaching vulnerable or ill-defended ... Read More
Nelnet breach affects 2.5M student loan accounts; Google releases emergency Chrome security update
The new school year is underway. It’s a good time to remember that adults aren’t the only family members cybercriminals target. Children of all ages, including college students, can be victims of identity theft and data breaches. In fact, according to Javelin Strategy and Research, 1.25 million kids — or about ... Read More
Streaming Media Platform Plex and Novant Health Experience Data Breaches
Experiencing a data breach can be costly. The annual Data Breach Report from IBM and the Ponemon Institute found the average data breach costs $4.35 million in 2022, a figure that has risen 12.7% since 2020. In addition to financial challenges, data breaches bring forth issues ranging from personal and ... Read More
Webinar Recap: What Small Businesses Get Wrong About Cybersecurity
BlackCloak founder and CEO Dr. Chris Pierson recently participated in a webinar on what small businesses get wrong about cybersecurity and how to avoid common mistakes. ContraForce, a cybersecurity readiness management tool for small businesses, sponsored the webinar. Adam Gladsden, head of cybersecurity solutions at Swiss Re, a global provider ... Read More
Concierge Digital Protection For Corporate Executives and High-Access Employees
This blog post on concierge digital protection for corporate executives and high-access employees was written by analysts at TAG Cyber. An executive’s digital footprint and online presence is one of the new attack surface vectors into a targeted enterprise. The personal devices and home networks of corporate leaders are often ... Read More