Black Hat 2016: What we learned at the conference At the annual Black Hat USA 2016 cybersecurity conference, held August 1-4 in Las Vegas, researchers and companies from around the world gathered to assess the latest threat environment and discuss solutions. The consensus opinion is that the bad guys are still far ahead, but there […]
Category Archives: Blog
The phrase “that could never happen to me” gets tossed around far too easily. It’s often used by people thinking they’re immune, or above, something (usually) bad happening to them. A common occurrence of this is the notorious identity theft. Until it happens to us, we consider it a fable, an impossibility, or a result of […]
Employment Identity Theft Identity theft is a federal crime. You’ve either probably heard about it in the news or might even know someone who has been an identity theft victim. It occurs when one’s identification is used or transferred by another person for unlawful activities. Identity theft is often committed to facilitate other crimes such […]
Be careful of identity theft when you travel With all of the risks of identity theft we subject ourselves to, the dangers are even greater when we’re away from our homes. When we go on vacation or travel for work, we are relinquished of that security that comes with our home and in more ways […]
Why are parents targeting their own children? The main responsibilities of being a parent are to shelter and protect their children and prepare them for life. Vague, I know, but not at all untrue. Parents would do anything in their power to help their children and safeguard them from potential danger. They’d loan them money, give […]
When was the last time you checked your medical records? Identity theft doesn’t just mean that thieves can rack up bills for things like clothes, food and gas. A stolen identity or credit card can also result in huge medical bills for services that you never received. Resolving these bills is a headache […]
What is ransomware? Ransomware is software that criminals use to lock you out of your own computer by encrypting the computer’s files and holding them hostage until you pay a “ransom.” The best way to protect your business from Ransomware, is by installing File Level Encryption. This is a form of encryption where individual […]