An ocean of data…and of ears
How much data is produced every day? A quick Google search will tell you the current estimate stands at 2.5 quintillion bytes. For those of us that don’t know the
An ocean of data…and of ears Read More
How much data is produced every day? A quick Google search will tell you the current estimate stands at 2.5 quintillion bytes. For those of us that don’t know the
An ocean of data…and of ears Read More
People’s perceptions have changed. Not so long ago we thought nothing of kids playing outside all day alone, unchaperoned visits to a friend’s house, walking to school alone – the
Cybercrime awareness is no longer enough to reduce risk Read More
I recently purchased a greenhouse from a well-known catalogue retailer – now I’m swamped with Google and Facebook ads for greenhouse accessories and all manner of gardening paraphernalia. Ever wonder
Are we thinking about Surveillance Capitalism the right way? Read More
We all enjoy life in the digital age and the Internet provides us connectivity, efficiency and fun. By submitting some of our personal data into online interfaces, we enjoy significant
How much control have we given up just to enjoy the digital life? Read More
Cybersecurity has traditionally been seen as a job for IT departments – and most employees assume that cybersecurity is simply a technical issue. But an examination of current threat types
Cybersecurity is a new HR benefit Read More
It is understandable that, when cybercrime happens to you, you can feel like you were targeted. And you certainly might be correct. However, more often than not, you weren’t originally
Social engineering: Opportunity makes the thief Read More
Social engineering cyber-attacks have rocketed to the forefront of cyber-security risk and have wreaked havoc on large and small companies alike. Just like a Renaissance actor drawn to Shakespeare’s genius
Psychology is the social engineer’s best friend Read More
Ransomware is a form of malicious cyberattack that uses malware to encrypt the files and data on your computer or mobile devices. As the name suggests, the cyber-criminals behind the
Ransomware: Stealing your data for fun and profit Read More
Everyone is familiar with the case in which the proverbial “little old lady” is duped out of her life savings by a villain contacting her through the phone or email.
Social engineering in the workplace Read More
Cyber fraud is lurking everywhere across the internet and one of the most effective tactics on victims is “phishing.” Phishing is a term for the use of disguised and misleading
A closer look at phishing attacks Read More
Would a company send me that? We’ve all heard of a phishing email. If you haven’t heard of a phishing email, now is the time to familiarize yourself with this
How to spot a phishing email Read More