In these times of the COVID-19 crisis, businesses must go back to the basics. And that means understanding how to provide the best-in-class customer service, taking care of their employees, and being resilient to this disaster. These all revolve around…
Data in Transit Encryption
The difference between data at rest and data in transit
When data collects in one place, it is known as data at rest. This data is stable and inactive, and therefore cannot travel across a network or within the system…
As we get deeper into dealing with the coronavirus outbreak, the need for authorities and experts to communicate reliably and effectively with each other, as well as to the general public, is vital.
Security researchers found a vulnerability in iOS software that may have allowed hackers to steal data from almost a billion Apple devices over the past two years. Reuters reported that a California-based security firm discovered the bug while investig…
Beware of another attempt by scammers to use the coronavirus pandemic to their advantage, in this case by selling you an e-book for $37, which actually is available for download for free. The title of the book is Pandemic Survival and it contains a c…
The UK’s National Cyber Security Centre (NCSC) has launched the next phase of its Cyber Aware campaign, which aims to help individuals and small businesses protect themselves online. The campaign, led by NCSC in conjunction with the Cabinet Office, Dep…
Just when we thought our COVID-19 anxieties couldn’t reach a higher peak, cybercriminals are actively exploiting the pandemic using a variety of new scams.
If you’re a parent of a teen or a tween, chances are you’ve heard them rave about TikTok. Kids spend hours on the popular app uploading their own lip-sync videos and sharing jokes, clips and other footage. Used wisely, it’s harmless fun.
Several countries — and now individual US states — are planning or have rolled out their smartphone-based contact tracing apps. These apps are designed so that local health agencies can figure out who was near someone who was infected, in the hopes of …
Data Security Issues in Cloud Computing
With the proliferation of online activity, more and more information is saved as data every day, meaning that more being stored in the cloud than ever before, opposed to hardware. There are three types of cloud:…