KEY POINTS A 2016 study by Kensington identified that a laptop is stolen every 53 seconds. Little has changed since… Read more Lost Your Computer or Mobile Device? Well Do Not Be like Dave!

KEY POINTS A 2016 study by Kensington identified that a laptop is stolen every 53 seconds. Little has changed since… Read more Lost Your Computer or Mobile Device? Well Do Not Be like Dave!
KEY POINTS Six out of ten Americans believe that it is impossible to go through daily life without having their… Read more How to Keep Your Phone from Tracking You in 3 Easy Steps!
KEY POINTS 95% of US teens are online, using the internet daily for school, to play video games, or to… Read more Understanding Cyberbullying – What to Do If Your Child or Loved One Is Being Bullied Online!
KEY POINTS Cyberspace is widely considered to be the fifth domain of modern warfare, which also includes space, air, ground,… Read more How Does One Find out If a Cyber Attack Is a State-sponsored or a Private Attempt?
KEY POINTS Accenture notes that 85% of organizations have reported that they experienced phishing and social engineering attacks in 2019.… Read more What Is the Primary Purpose for Instituting a Security Awareness Program?
KEY POINTS “One in 10 adults in the US will fall victim to fraud every year.” (Business Insider, 2019) In… Read more How to Avoid Falling Victim to a Gift Card Scam!
KEY POINTS A 2016 study by Incapsula revealed that 51.8% of all internet users were actual robots! Bots can typically… Read more 3 Ways to Spot a Bot on Social Media
KEY POINTS A Clark School study at the University of Maryland determined that cyber attacks take place every 39 seconds… Read more 3 Alarming Cybersecurity Findings – An easy to digest infographic.
KEY POINTS Originally launched by ByteDance, for markets outside of China in 2017, TikTok is one of the most popular… Read more Is TikTok Really That Bad? An Analysis of the Privacy Concerns Associated with the App.
This Ask the Experts session stems from a question originally posted on Quora regarding data security best practices. Our computers… Read more What Should You Do With an Old or Broken Computer That Still has Personal Information On it?