Newsletter May 2018

Say ‘I Do’ to Cyber Safety From the Cyber Security Alliance More than ever before, mobile devices are the preferred planning tool for couples preparing to tie the knot. For better or for worse, 92 percent of brides-to-be (and some grooms, too!) are checking off to-do lists virtually via their smartphones. The icing on the cake is that these devices can be used for researching gowns, tuxes and various vendors, sharing announcements, managing registries and honeymoon travel and creating personal websites. With the whirlwind of emotions leading up to your wedding, the National Cyber Security Alliance (NCSA) proposes several tried-and-true tips to help ensure thatRead More →

Cyber Safe Honeymoon

More than ever before, mobile devices are the preferred planning tool for couples preparing to tie the knot. For better or for worse, 92 percent of brides-to-be (and some grooms, too!) are checking off to-do lists virtually via their smartphones. The icing on the cake is that these devices can be used for researching gowns, tuxes and various vendors, sharing announcements, managing registries and honeymoon travel and creating personal websites. With the whirlwind of emotions leading up to your wedding, the National Cyber Security Alliance (NCSA) proposes several tried-and-true tips to help ensure that this special time in your life is safe and secure. EverlastingRead More →

IoT Security

used with permission from Norton by Symantec Recently, there have been reports in the media and online about state sponsored, targeted attacks moving into the router and IoT security space. While not an immediate threat to consumers, these kinds of attacks are examples of what could potentially be in store for router security in the coming months and years. What does this mean for me? Reports like these are reminders that we should pay more attention to the security of our router and home wi-fi. Once a home network is compromised via the router, an attacker can gain access to a treasure trove of informationRead More →

Insider Threats Employee Accident

Be Wary of Insider Threats to Your Security Not all security threats come from outside: human beings in organizations are often threats as well, from accidents to negligence to malicious behavior. Be wary of the inside threats as well when considering your overall security posture. How can employees pose a risk? Any user with network permissions can inadvertently delete or compromise data. This behavior is accidental, rather than malicious, but it can be just as bad. Then there’s negligence: sometimes employees violate security policies or best practices through well-intentioned but harmful actions or inattention. And lastly, there are malicious insiders. The classic example is theRead More →