The Netflix Sharing Problem

Author(s):

Zia Hayat, CEO, Callsign

Red Head Woman watching Netflix on her Smart TV, Watching Daredevil, Options on the Bottom of TV like Daredevil, Black Mirror, Peaky BLinders, Glitch, The Crown, etc.

Netflix Has a Problem With Password Sharing. We have all heard the story of the college grad using his former roommate’s parents’ Netflix password. We all know the ex-boyfriend binging his favorite shows with his ex-girlfriend’s account credentials. Many consider the sharing economy a positive thing. However, Netflix, Hulu, Amazon, HBO and others are literally … Read more

The Top 5 Cybersecurity Myths That Need to Die

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cybersecurity Myths Man in Suit Looking at a White Wall With Two Direction Arrows Pointed To Fact or Myths

Cybersecurity myths are pervasive ideas people have about cybersecurity that weaken your cybersecurity posture. These myths often are defense mechanisms, rationalizations for apathy and inaction. It is important to dispel these myths. Otherwise, you could be opening yourself, or your business, to vulnerability. Cybersecurity Myth #1: Cybersecurity is the IT Guy’s Problem If you work … Read more

Password Safety: A Comprehensive Guide to Choosing a Good Password

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Password guesses on a notepad. First two are bad passwords and the third one is a more complex password.

Password security is the most basic and ubiquitous form of cybersecurity. Every single account created online has a password attached to it. They predate the internet by hundreds of years and to this day, they remain the most reliable form of user authentication. So why does everybody choose such terrible passwords? What Makes a Password … Read more

Insider Threats – 2018 Statistics

Author(s):

Zehra Ali, ,

Evil man typing on computer, Insider Threats, cyber criminal.

Insider Threat (Fundamentals) As discussed, the insider threats are not always bred out of malicious nature. In fact, many insider threats exist due to the unintended or accidental happenings. More than 51% of companies are concerned about the unintentional insider attack. However, 49% of the companies are still worried about malicious insider, which do exist and are … Read more