Privacy is a hot topic, and alarming revelations about identity theft and data breaches seem to happen daily. As organizations work to keep Personal Data and Personally Identifiable Information (PII) safe and secure, it becomes more and more apparent that everyone has a role to play in protecting data privacy. The important thing to remember is PII is defined as social security number (SSN), passport number, driver’s license number, taxpayer identification number, patient identification number, financial account number, or credit...
As we slowly come out of the pandemic and start traveling again, we should take a few minutes to refresh ourselves on the digital dangers associated with travel. Traveling is a prime time of risk for your mobile devices – including smartphones, laptops, and tablets – whether from theft or hacking. However, there are steps you can take to help protect your devices and data. We’ll go over some recommendations for you before and while traveling. Protecting Your Data Before...
It sounds so simple, but the basic idea of a clean desk extends well beyond just looking good… it promotes organization, efficiency, document security and it helps keep your work uncluttered. Many companies, productivity, and security professionals state that a desk must be clean at all times. This idea is rather foreboding since it’s nearly impossible to have nothing on your desk, but the idea is to have only what is necessary on your desk at any given time. Do...
Malware, short for “malicious software,” includes any software (such as a virus, Trojan, or spyware, etc.) that is installed on your computer or mobile device. The software is then used, usually covertly, to compromise the integrity of your device. Clicking on links in harmful websites, downloading infected software that may include toolbar add-ons and other apps, file sharing, and removable media are all ways to get malware. Links or attachments in email, social media posts, and online advertising are often...
The Internet of Things (IoT) is the network of physical objects or “things” embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data via the internet. Cars, appliances, thermostats, door locks, smoke alarms, wearables, lighting, healthcare, and home security all contain sensing devices that we can control with our smartphones from anywhere, and they can talk to other machines and trigger other actions. Like an electric kettle that is controlled from a phone...
With spring in full swing we are all looking forward to warmer weather, flowers blooming . . . and cleaning? Yes, there’s a good chance your weekend plans may include the annual scrubbing, sweeping, and decluttering of your home so you can just relax and enjoy the warmer weather and flowers blooming with little worries. And while clearing clutter is an annual ritual for many households, most don’t think about freshening up their online life with a digital spring cleaning,...