I recently read an article from Heimdal Security about online safety. In this article Heimdal had asked 18 experts in the field of cybersecurity for their top 3 ideas about how to stay secure. The contributors included top cybersecurity professionals from several anti-malware companies, security bloggers, and cybersecurity industry professionals. The original article is here.
What I found interesting were the ...
Continue Reading →MAR





Controlling your professional information can mean managing the information you disclose on professional networking sites such as LinkedIn. It can also mean protecting the client and employee information you have gathered through your employment. It may mean securing your computer network from outside and inside attackers, or your website from compromise. It may mean properly securing online assets ...
As we approach year-end, many small and medium sized business owners and managers are coming to the realization that their best intentions for creating a cybersecurity program in their organization have fallen short. This was the year, you promised yourself, that we get a handle on computer and network security.
As we add more mobile and portable devices to our digital collection, cybersecurity for mobile devices becomes more important. Smartphones, tablets, wearable tech, and ultra-portable laptops are certainly convenient and easy to carry, but that makes them easy for a thief to carry off. When these devices are stolen, you lose much more than the hardware. Every bit of information on the device is up for grabs too, from contact lists, personal information, ...