The enemy is us: a look at insider threats

It could be the engineer in the IT department, the janitor mopping the lobby, one of the many managers two floors up, or the contractor who’s been in and out the office for weeks now. Or, maybe it could be you. It could be the engineer in the IT department, ... Read More

Social engineering attacks: What makes you susceptible?

Cybercriminals will do what it takes to get what they want, whether that's breaching a corporate network or stealing credentials with malware. But what do we do if hackers are hacking us instead of our computers? Here's how to tell if you're susceptible to social engineering attacks, and what to ... Read More

A primer: How to stay safe on Amazon’s Prime Day Sale

While Amazon is poised for its fourth year run of Prime Day, the e-commerce giant’s annual flash sales event for Prime members, shoppers on the hunt for bargain deals are ready and revving, too. But before you review your shopping list, let us first review some points we need to ... Read More

When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained

Maybe it’s the quirky way some tech writers abbreviate it, or the surreal way it reminded you of that popular Michael Jackson song. Whatever triggers you to remember the term, for most of us, man-in-the-middle embodies something both familiar yet mysterious. Let’s get to know this threat a little bit ... Read More
Internet Safety Month: How to manage your child’s online presence

Internet Safety Month: How to manage your child’s online presence

Parents with good intentions may not realize that by sharing photos of their children on social media, they have already created their online presence. The good news is that their online reputation can be managed, and you can teach them how to do it, too. Categories: How-tos Tags: manage online ... Read More

Internet Safety Month: How to protect your child’s privacy online

This month is Internet Safety Month, and today we'll be talking about online privacy for children. For parents and caretakers, nothing could be more troubling than the thought of having your child's personal information stolen and used by nefarious actors. In part one of this two-part series, we'll discuss how ... Read More

Why bad coding habits die hard—and 7 ways to kill them

When it comes to poorly-written code, we're quick to point a finger at programmers, forgetting that they are beholden to the constraints of companies looking to push out tech product quickly. Thankfully, management can address bad coding habits with these seven ways to support, train, and motivate their staff. Categories: ... Read More
Parenting in the Digital World: a review

Parenting in the Digital World: a review

Parents don't just hand over the car keys to children who haven't taken driver's ed. Sadly, the same can't be said about smartphones. This book by Clayton Cranford shows parents the importance of keeping their kids safe online—and just how to do it. Categories: FYI Tags: child security onlinecyberbullyinginternet safetyparenting ... Read More

Engaging students in cybersecurity: a primer for educators

The continuing rise of cybercrime calls for a new breed of fighters. Are teachers prepared to take on the challenge of training the current and future generations of cybersecurity professionals? How can they introduce and engage students in this fast-growing field of study? Categories: FYI Tags: cybersecuritycybersecurity educationeducationK-12 cybersecurityskills gapskills ... Read More

Securing financial data of the future: behavioral biometrics explained

Sophisticated social engineering. Fileless malware. Specialized Trojans. These are the threats that keep the financial sector on its toes—making way for a new mode of authentication called behavioral biometrics. And its primary concern is not what your credentials are but how you enter them. Categories: Business Tags: artificial intelligencebehaviometricsbehavior-based authenticationbehavioral ... Read More