Lessons Learned From Data Breaches Past

Author(s):

Frankie Wallace, ,

lock and key on a keyboard

Information is one of the most valuable currencies there is. Whether it is sensitive corporate information or sets of individuals’ personal information, there are people out there who are interested in seeing it — legally or otherwise. While many consumers accept that companies collect and sell their data regularly, data breaches are a very real … Read more

Social Media Platforms are Vulnerable to Hackers

Author(s):

Frankie Wallace, ,

Social Media Platform Cameras on Computer, Cybersecurity

Did you know that security concerns are turning people away from social media platforms? They are aware that hackers are obtaining users’ personal data through the most commonly visited media sites. If you are on social media platforms in any capacity, you’re probably aware of this fact, and it may have even already happened to … Read more

The Importance of Protected Digital Assets

Author(s):

Frankie Wallace, ,

Digital Assets

A significant number of your digital assets, whether personal or professional, are now digital in this current age. The transfer of business practices, records, and even storefronts from a mostly physical world to a digital plain has developed rapidly over the last couple decades. Because of this, we are increasingly concerned about the security of … Read more

The Consequences of Digital Piracy

Author(s):

Patrick Putman, ,

Digital Piracy, people pirating music and photos of a giant computer

Digital content can be quite expensive. Especially when you get into the high-end software packages. Sometimes this content costs several thousand dollars. But not everyone can afford these prices. If you have spent any amount of time on the internet, you have heard of digital piracy. Digital piracy is a form of copyright infringement. However, piracy … Read more

Hospitality Breaches

Author(s):

Josh Henry, ,

Hospitality Breach picture of Courtyard Marriott

Leaving the Light on for Everyone Hospitality breaches are the newest target for bad actors. Data breaches are making headlines more and more. As a result, large corporations in the hospitality industry are acquiring large targets on their back. Of course, this is no surprise. In fact, this problem has escalated since last year. Needed … Read more

Blockchain Meets Cybersecurity

Author(s):

Zehra Ali, ,

Blockchain abstract, blue chain links

Where Blockchain Meets Cybersecurity Blockchain technology is a powerful public ledger that records every “block” of data as it moves across many computers. Businesses of all types and sizes have to deal with a lot of information on a daily basis. Data is usually an extremely valuable asset for their operations. But keeping it safe … Read more

Insider Threats – 2018 Statistics

Author(s):

Zehra Ali, ,

Evil man typing on computer, Insider Threats, cyber criminal.

Insider Threat (Fundamentals) As discussed, the insider threats are not always bred out of malicious nature. In fact, many insider threats exist due to the unintended or accidental happenings. More than 51% of companies are concerned about the unintentional insider attack. However, 49% of the companies are still worried about malicious insider, which do exist and are … Read more

How to Recover a Hacked Website

Author(s):

Julia Sowells, ,

Computer with spam bursting out hacked computer

A hacked website is not notable news; it has become an almost common thing. So, what to do if you have a hacked website? How can you work on recovering things and bouncing back? Well, it is not that difficult. Here is a look at some easy steps that will help in the recovery process: Step … Read more

What is a Honeypot?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

honeypot sitting on a brown paper on a table. Spoon in honey. Honey jar.

In 1986, systems administrator Clifford Stoll noticed nine seconds of unpaid computer time at the Lawrence Berkeley National Laboratory. Upon being asked to resolve this, Stoll eventually came to the conclusion that a hacker had illegally gained access to their network by exploiting a vulnerability. Stoll decided he would set up a trap for the hacker. He … Read more