How Much Cell Phone Data Privacy Should We Expect?

Author(s):

Scott Blough | Associate Professor of Criminal Justice & Security Studies at Tiffin University, ,

According to the Pew Research Center, more than 96% of Americans own a cell phone. Among people ages 18 to 49, the number rises to 99%, with almost as many in this age group having a smart phone. Therefore, almost all of us share a common concern: cell phone data privacy. The Right to Privacy … Read more

Teaching Cybersecurity to Kids

Author(s):

Frankie Wallace, ,

Cybersecurity Teach to Kids girl on Computer Education Classroom Teacher

As people who grew up without cell phones, tablets, and computers, today’s parents have — at least generally speaking — learned to be skeptical of technology. We understand that there was a world before it, and we lived through some of the earliest threats (like Y2K, the Target hack, the Equifax data dump, and more). … Read more

Logic Bombs: How to Prevent Them

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Logic Bomb concept, illustrating logic bombs, tick tock, white time bomb

A logic bomb is a piece of malicious code that hackers insert into a software or operating system. This code lies dormant until a specific condition occurs. These conditions could be a pre-determined time (often referred to also as a time bomb) or a specific command that the user types in. Once the conditions occur, … Read more

Business Solutions That Are More Secure in the Cloud

Author(s):

Kayla Matthews, ,

Business Solutions Cloud

One of the big decisions company owners must make is whether to use cloud-based or on-premises business solutions. Here are five solutions that are more secure when hosted in the cloud. Content Storage Google Drive, Dropbox, iCloud and OneDrive are some of the leading cloud-based business solutions. Indeed, these solutions allow people to store documents, … Read more