The Truth About Healthcare Cybersecurity

February 7, 2017

From 2015 to 2016, our country saw the number of Healthcare Cybersecurity breaches double. Since then, security breaches across all fields have continuously been on the rise, with 2017 ushering in some of the largest identity theft hacks in history. No one likes to hear that any personal information has been compromised, but it gets […]

Read the full article

Cyber Security: Online Crime Trends You Should Know About

October 25, 2016

This may be the first U.S. presidential election in history where cyber security has been a point of debate. Hillary Clinton used personal servers for government business, while Donald Trump’s corporate web servers were not secure. Politics aside, this drives home the point that cyber security experts have been making for many years: cyber security […]

Read the full article

How to Ensure Credit Card Reader Consumer Safety

May 31, 2016

Anyone that has worked in the realm of retail surely knows that Point of Sale (POS) systems and credit card reader use have been a hot target for attacks, hacks and other malevolent behavior. After all, the information gathered during the typical retail transaction consists of much more than just dollar amounts and SKU codes. […]

Read the full article

Can Biometrics Enhance Security of Mobile Banking Apps?

May 12, 2016

Mobile banking apps or any mobile apps that involve the use of financial or private information are only as secure as your mobile device, whether notebook, laptop, or smartphone. Many of us own several mobile devices, but how secure are they?

Read the full article

9 Nontechnical Ways Hackers Secure Data

March 21, 2016

Considering an expensive technological upgrade to minimize the danger of a successful hacker breach? Think again! Installing all possible hardware and software upgrades will not protect your company from the human element. Your staff are a much more attractive target to cyber criminals and are hacked more easily than any technical restrictions present on your […]

Read the full article

Hiring Information Security Aware Workers

March 16, 2016

Today’s HR departments are faced with many challenges when it comes to selecting the correct candidate for an open position. Beyond the ubiquitous background checks, knowledge assessment and checking references, HR needs to take other factors into consideration to select the best candidate. Nowhere is this truer than in organizations looking to hire knowledge workers, […]

Read the full article