OnePlus Reveals Second Data Breach in Two Years

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

OnePlus

Smartphone manufacturer OnePlus has been the victim of a data breach in which an unauthorized party gained access to customer’s order information. One Plus has released a statement revealing that customer names, contact numbers, emails, and shipping addresses might have been susceptible to theft. However, they have revealed that customer’s payment information, passwords, and accounts … Read more

Balancing Automation With Security

Author(s):

Kayla Matthews, ,

Automation cybersecurity graphic

Adding automation to your workflow can streamline tasks and boost productivity. Indeed, with advances in technology, more companies are jumping on the trend and reaping the benefits. However, adoption will undoubtedly impact your company’s security. Here are five things you should know to reduce security risks caused by automation. Prioritize Security in Automation One issue … Read more

Biometric Technology Industry

Author(s):

Pratik Kirve, ,

Biometric Technology Abstract

Advances in biometric technology have transformed the conventional ways of identification and verification. As a result, innovation has become a prime focal point for reducing the efforts of people. This is achieved with new forms of verification and ensuring the security. From vocal biometric technology used for telephone banking to approving new patents for Apple’s … Read more

The Importance of Cybersecurity Training

Author(s):

Frankie Wallace, ,

Cybersecurity training is imperative to the success of any modern workplace. The work force has transformed over the years, as has the technology required to operate it. Digital transformations and full-scale transitions over to cloud infrastructures have meant large changes for organizations wishing to remain relevant while providing employees and customers with better overall experiences. … Read more

Cybersecurity Services

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

hand holding cloud connected to apps, raining information, cybersecurity services

There are a lot of common issues that plague your digital devices. Traversing the internet is no simple task in 2018. For example, one in thirteen web requests lead to malware. It is incredible likely that your computer will get a virus at some point in your lifetime. That likelihood grows yearly. This is seen … Read more

What is a Firewall and How Does it Work?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cords plugging into a system firewall

Firewalls have essentially been around since the beginning of the internet. A firewall is a network device designed to protect your system by monitoring and controlling information traffic based on a preset list of rules to ensure security. Firewalls establish a barrier of protection between a trusted network and a foreign network. They are one … Read more