Data breaches continue to plague companies and harm consumers. Passwords are too often what we depend upon to keep our data safe, but too often they don’t work. A look at password challenges and the role of business and consumers in keeping data more safe.
Honesty, Transparency, and Data Collection: Improving Customer Trust and Loyalty
Some companies are leading the push for better data privacy and are being rewarded with customer loyalty. Here are the standouts you might not have heard about.
Privacy and Security in Digital Marketing: Threats You Need to Know
One of the sectors in your company that is most exposed to these privacy and security risks is your marketing department. Here’s what you need to know to protect yourself.
Apple’s iOS 14 Privacy Update Changes The Complexion Of User Data Collection
With its new privacy update impacting the way advertisers collect data, Apple is changing the complexion of data collection which will materially change the way advertisers collect and use data to deliver targeted ads and customer experience.
Are You PhishProof?
Phishing is one of the most common forms of cybercrime, so if you’re online, you’ve likely been targeted by a phishing attack—and you might not even know it. So what is phishing exactly? It’s the act of collecting personal information—including bank account numbers, passwords, and usernames—through electronic means, such as deceptive email messages and phone calls. According to RSA’s report …
How To Avoid Being the Victim of a SMiShing Attack
SMiShing is not a new tactic. A form of phishing, SMiShing is an activity that involves someone attempting to trick you via text or SMS message. If the trick is successful, the individual will receive your critical personal information. Did you know that there are approximately 913,242,000 texts sent every hour of every single day around the globe? This translates …
Instagram Phishing: How to Prevent It and What to Do If It Happens to You
Phishing is the most popular way to hack Instagram accounts, because, according to the hackers themselves, it’s the easiest! Instagram Phishers simply create a fake login page that looks just like the one on the “real” Instagram. Hackers create this spoofed login page through fake apps promising to help manage Instagram users’ accounts and use free hosting and paid accounts …
5 Reasons DevOps and Security Need to Work Together
There is nothing like speeding up your business processes and development cycles is there? DevOps has revolutionized the way businesses meet the constantly evolving needs of their customers, without sacrificing productivity. Even as good as it sounds, it can still come at a price if DevOps and security are not working together. With the speed at which new iterations are …
How to Create an Effective Business Continuity and DR Plan
We rarely get a warning when disaster is about to strike, be it a natural disaster or a cyberattack. Your best chance at detecting, containing and responding to a disaster of any kind is through a tested and proven plan. An effective business continuity plan and DR Plan provides detailed instructions before, during and after disaster strikes—and can make or …
The Roles CFOs and CMOs Need to Play in Cybersecurity Protection
There are a lot of players in the C-Suite these days, and chances are good they all have their own strategic priorities. The CFO wants to save money and deliver quality returns to investors. The CMO wants to churn data to find better and smarter ways to reach customers. The CIO wants to find ways to utilize new technology while …