FEATURED ARTICLE

How to Send Breach Notifications

It has happened. Despite the annual security training. Despite the investment in cyber security. Cybercriminals breached your systems and stole your customers’ information. What do you do now? You’ll have to secure your network and determine which data may have been breached. But after you’ve shored up your systems, there’s…

Read More
Private and confidential image

Protect Your Identity Like a Trade Secret

Online identity theft continues to plague consumers worldwide. While technology enables greater cooperation and sharing, it also exposes ...
Read More
scam popup on laptop

Tech Support Scams Demystified

More than 3.8 billion people worldwide have internet access today, and as many as 3 out of 5 ...
Read More
kids using smartphones

5 Ways to Keep Your Child Safe Online

My 10-year-old niece was recently gifted with her dad’s old smartphone. While it doesn’t have phone service, it ...
Read More
Pouring out pill ingredients

Counterfeit Medications: Do You Know What You’re Really Buying Online?

Do you remember the Internet from 30 years ago? It wasn’t in our pockets, in our cars, or ...
Read More
Gaming

Don’t Get Played by Counterfeit Gaming Hardware

With over 600 million console gamers worldwide (and growing!) and a market generating an estimated $34.6 billion in revenue in ...
Read More
Send email key on keyboard

Who is Reading My E-mail?

In the Middle Ages, important documents were closed using wax seals. This was done to prevent unauthorized access. ...
Read More
Home smart device speaker

5 Ways to Protect Your Internet of Things

We’re firmly in the post-holiday season. Finally, all the stress of shopping and travel is over. Now that ...
Read More
Phishing Email concept

Five Ways to Avoid the Threat of Email Phishing

As businesses move to digital platforms, persistent cyber threats continue to compromise personal information using tactics such as ...
Read More