Cybercriminals in Movies and TV Shows

Author(s):

Frankie Wallace, ,

cybercriminals, hacker dude in a movie or tv show cybercriminals

Hollywood has long held a certain image of cybercriminals. What they look like, how they commit their crimes, and their motivations. However, like many things in Hollywood, the portrayal of hackers and cybercrime in general often misses the mark. A lone-wolf hacker takes on a corrupt corporation. They simultaneously drain their enemies bank accounts while … Read more

Mental Health and Cybersecurity

Author(s):

Frankie Wallace, ,

Mental health cybersecurity, girl sad, phone bad, girl on phone

Strong cybersecurity is vital, and the cybersecurity industry is evolving at a rapid pace. Still, even as more and more companies embrace cybersecurity professionals, a key aspect of this field remains overlooked: mental health. You might ask yourself what cybersecurity has to do with mental health. While acts like cyberbullying can obviously lead to negative … Read more

The Importance of Cybersecurity Training

Author(s):

Frankie Wallace, ,

Cybersecurity training is imperative to the success of any modern workplace. The work force has transformed over the years, as has the technology required to operate it. Digital transformations and full-scale transitions over to cloud infrastructures have meant large changes for organizations wishing to remain relevant while providing employees and customers with better overall experiences. … Read more

Cybersecurity Trends in The Healthcare Industry

Author(s):

Frankie Wallace, ,

Healthcare Industry Cybersecurity

The healthcare Industry contains private and sensitive information about millions of patients in every country. Therefore, it’s no wonder that in 2017, it was the target of over 50 percent of cyber-attacks. Loaded with identity-revealing information like social security numbers, dates of birth, billing information and, of course, health insurance information, these details can be … Read more

Lessons Learned From Data Breaches Past

Author(s):

Frankie Wallace, ,

lock and key on a keyboard

Information is one of the most valuable currencies there is. Whether it is sensitive corporate information or sets of individuals’ personal information, there are people out there who are interested in seeing it — legally or otherwise. While many consumers accept that companies collect and sell their data regularly, data breaches are a very real … Read more

Social Media Platforms are Vulnerable to Hackers

Author(s):

Frankie Wallace, ,

Social Media Platform Cameras on Computer, Cybersecurity

Did you know that security concerns are turning people away from social media platforms? They are aware that hackers are obtaining users’ personal data through the most commonly visited media sites. If you are on social media platforms in any capacity, you’re probably aware of this fact, and it may have even already happened to … Read more

Why You Should Destroy Your Old Cell Phone

Author(s):

Frankie Wallace, ,

Destroying a Cell Phone with a hammer, Cellphone

Today, just about everyone has a cell phone, with expanded mobile options that have heavily influenced culture in countless ways, from fashion to software development. Moreover, it is common to get a new cell phone every couple of years or so, especially if a newer, better model has come out. However, one area that has … Read more