February 16, 2022
BeyondTrust Privileged Remote Access strengthens security
BeyondTrust Privileged Remote Access gives you more control over remote vendor access. All connections are established via a single access channel, with granular, role-based access to specific systems and session settings
February 2, 2022
How to tell if your phone has been hacked
In quite a few ways, actually. One of the more common tactics used to compromise a victim’s device is using phishing and malspam emails that contain malicious links or attachments.
January 21, 2022
Making loyalty pay: How to keep your loyalty rewards safe from scammers
Loyalty accounts are big business, and hackers and fraudsters are increasingly zeroing in on a potential goldmine. According to one study, the global market for loyalty management is set to grow at an annual growth rate of 12.3% over the coming seven years to reach nearly US$18 billion by 2028. And where there's money and users, cybercrime inevitably follows.
January 11, 2022
Instagram and teens: A quick guide for parents to keep their kids safe
“Safety notices in DMs will notify young people. For example, if an adult is sending a large amount of friend or message requests to people under 18, we’ll use this tool to alert the recipients within their DMs and give them an option to end the conversation, or block, report, or restrict the adult”, Instagram announced in March 2021.
January 8, 2022
CES 2022: A sea of sensors than people
The sheer amount and variety of tiny sensors that will impact practically everything in your life in the next few of years make up for the show's lack of real attendance.
January 1, 2022
Must know 22 cybersecurity statistics for 2022
As the rollercoaster of a year that was 2021, a list of important cybersecurity data that will help you keep on top of your security and privacy game in the coming year.
December 21, 2021
Don’t forget to unplug your devices before you leave for the holidays!
The four devices at 4 kWh, assuming 30% of people have a workspace, either at home or an office and they leave everything in standby, then 38.4 million kWh are being used for no useful purpose. This creates a carbon footprint, allowing for a typical energy mix, of 15 tons of CO2 emissions per year.
November 22, 2021
The top 10 ways ransomware operators ramp up the pressure to pay
Some of the tactics attackers use to coerce victims into paying are ruthless and could potentially be more damaging to an organization than a period of downtime. Attackers deliberately try to undermine their target's relationships, trust and reputation. Sometimes the approach they take is very public; at other times, it's more direct and personal.