Category: Cyber / Computer

articleARTICLES

Combating Cyber Crime

Today’s world is more interconnected than ever before. Yet, for all its advantages, increased connectivity brings increased risk of theft, fraud, and abuse. As Americans become more reliant on modern technology, we also become more vulnerable to cyberattacks such as corporate security breaches, spear phishing, and social media fraud.

read more
Combating Cyber Crime

Cyber Security Overview

Cyberspace and its underlying infrastructure are vulnerable to a wide range of risk stemming from both physical and cyber threats and hazards. Sophisticated cyber actors and nation-states exploit vulnerabilities to steal information and money and are developing capabilities to disrupt, destroy, or threaten the delivery of essential services.

read more
Cyber Security Overview

Protect Yourself Against Tax Refund Fraud

With the April 15 deadline approaching, millions of Americans are finalizing the preparation and filing of their taxes. Unfortunately, tax season is a busy time for cyber criminals and scammers as well. 

read more
Protect Yourself Against Tax Refund Fraud

Ebay Password - Security Breach

To help ensure customers' trust and security on eBay, I am asking all eBay users to change their passwords.Here's why: Recently, our company discovered a cyberattack on our corporate information network. This attack compromised a database containing eBay user passwords.What's important for you to know: We have no evidence that your financial information was accessed or compromised. And

read more
Ebay Password - Security Breach

Ransomware on the Rise

Your computer screen freezes with a pop-up message—supposedly from the FBI or another federal agency—saying that because you violated some sort of federal law your computer will remain locked until you pay a fine. Or you get a pop-up message telling you that your personal files have been encrypted and you have to pay to get the key needed to decrypt them.

read more
Ransomware on the Rise

Protect your Computer from Virus Corruption

Make sure you have updated antivirus software on your computer. Enable automated patches for your operating system and web browser. Have strong passwords, and don’t use the same passwords for everything. Use a pop-up blocker. Only download software—especially free software—from sites you know and trust (malware can also come in downloadable games, file-sharing programs, and custo

read more
Protect your Computer from Virus Corruption

Latest Ransomware Threat - January 2015

A fairly new ransomware variant has been making the rounds lately. Called CryptoWall (and CryptoWall 2.0, its newer version), this virus encrypts files on a computer’s hard drive and any external or shared drives to which the computer has access. 

read more
Latest Ransomware Threat - January 2015

Cyberbullying Tactics 2015 - 42 Cyberbullying Examples

Cyberbullying Tactics 2015 is a prevention education article and website page resulting from my research conducted in October 2014, along with input from parents, educators and pediatric professionals. Cyberbullying is one typology included in my Information Age darkside of human consciousness construct. Of the seven typologies, cyberbullying is the only profile that requires the aggressor and tar

read more
Cyberbullying Tactics 2015 - 42 Cyberbullying Examples

The Need for Physical and IT Security Convergence

Business security professionals make it a point to study their craft and learn ways to counter evolving threat. Business intelligence methods need to continue to keep up with technology to analyze and prevent the internal and external influences that can ruin the enterprise. The threats corporations face include: theft, vandalism, workplace violence, fraud, and computer attacks. Through a system o

read more
The Need for Physical and IT Security Convergence

Compliance and Security

It is possible to have excellent security and not be compliant, and it is also possible to pass a compliance audit and have a very poor organization security. The illusion that compliance equals security has led organizations to excessively spend on compliance at the detriment of security. 

read more
Compliance and Security

Results Per Page    first previous of 1 next last