Archives
The office has been disinfected, work spaces are rearranged, and now we can begin our return to working in the office. But has the company planned for IT security challenges? Tab Bradshaw, Chief Operating Officer at Redpoint Security, has put together…
Read More
Category: Commercial, Education, Employees, Risk Management, Technology
Tags: backup, backup solutions, cyber, cyber security, cybersecurity, data, data restoration, information technology, loss prevention, malware, malware attack, Microsoft Office, multi-factor authentication, office, operating system, original equipment manufacturer, preventative maintenance, ransomware, risk management, software, vpn, web browser
As the popularity of the internet and electronic devices continues to grow, so do the number of places where cybercriminals can find—and steal—our personal data. The rise in device ownership is also creating an enormous amount of e-waste. The World…
Read More
Category: Cyber, Personal, Prevention, Technology
Tags: cyber security, cybercriminals, CyberScout, donate, Earth Day, electronics, identity fraud, Internet, personal data, protecting your data, recycle
We recently posted about Deepfakes being a new cyberthreat for 2021. There are a few more threats to be aware of this year, and knowledge about them is the best defense.
Read More
Category: Cyber, Home, Personal, Prevention, Technology
Tags: artificial intelligence, cyber security, cyberthreat, data breach, hackers, IoT, machine learning, malware, phishing, ransomware, technology
The threat landscape of cybersecurity changes daily, with hackers and cybersecurity professionals in a perpetual cat-and-mouse chase; hackers discover new ways to infiltrate and exploit their targets, and the cybersecurity industry looks for vulnerabilities, tries to anticipate new threats, and…
Read More
Category: Cyber, Personal, Prevention, Social Media, Technology
Tags: artificial intelligence, cyber security, cyberattack, CyberScout, deepfakes, hackers, Personal Cyber Protection, phishing scams, ransomware, scams
The 2020 holiday season is coinciding with a major spike in COVID-19 cases and fatalities and many families are opting to avoid travel and potentially exposing elderly and/or vulnerable relatives. Hosting gatherings on video conferencing platforms such as Zoom or Google Meet…
Read More
Category: Cyber, Personal, Prevention, Social Media
Tags: cyber security, CyberScout, cybersecurity, encryption, fraud emails, Google, hacking, phishing scams, social media, typosquatting, Zoom
The holidays are the most wonderful time of the year, especially for scammers. Consumers are typically spending more, doing it quickly, and not paying as much attention to who they’re buying it from because of the rush. With the COVID-19 pandemic,…
Read More
Category: Cyber, Prevention, Trusted Choice
Tags: attachments, Black Friday, Black Friday shopping, credit cards, cyber crime, Cyber Monday, cyber security, CyberScout, online banking, online safety, online shopping, phishing, phishing scams, public wi-fi, scammers, secure websites, skimmers, strong password
A few weeks ago, my sister asked me to stop by her house to check on a few things while she was on vacation. When I walked into her house, I nearly jumped out of my skin as I heard…
Read More
Category: Central, Cyber, Home, Personal, Social Media, Technology
Tags: cyber crime, cyber insurance, cyber insurance coverage, cyber security, digital home, Internet of Things, National Cyber Security Alliance (NCSA), National Cyber Security Awareness Month, Personal Cyber Protection, phishing, security software, smart technology, strong password, system updates, technology, Two-Factor Authentication
It’s estimated the “Surface Web”—websites and data visible to everyone—represents less than five percent of the total information and locations on the internet. Beneath the surface lies the Deep Web—also known as the Hidden, Invisible and Dark Web. [1] In…
Read More
Category: Cyber, Personal, Prevention, Technology
Tags: cyber attack, cyber crime, cyber insurance, cyber security, CyberScout, Dark Web, identity theft, identity thieves, Internet, password, Personal Cyber Protection, personal information, phishing scams, Two-Factor Authentication
Since October of last year, I always try to have my phone’s ringer turned up if I am not working, and I’m much more adamant about picking up a phone call. Like many people, I tended to silence my phone a…
Read More
Category: Home, Personal, Prevention, Social Media, Technology
Tags: computer attack, computer attacks, cyber, cyber attack, cyber crime, cyber criminals, cyber insurance, cyber insurance coverage, cyber risk, cyber security, cyber thief, cybercrime, cybersecurity, hacked, hacker, Personal Cyber Protection, scam, scams
Data breaches, hacks, and email fraud are hitting businesses of all sizes. It’s not just the big corporations like Equifax and Marriott International—all companies need to prioritize cybersecurity. According to one report, two-thirds of SMBs suffered a cyberattack in…
Read More
Category: Business, Commercial, Education, Employees, Prevention, Technology
Tags: business, business owner, cyber, cyber attack, cyber crime, cyber insurance, cyber insurance coverage, cyber security, cybersecurity, data breach, data defense, data plan, employee, employee scams, fraud, fraud alert, fraud emails, hacker, hackers, preparedness, technology, training