Experiencing a data breach purely from being internet-connected is quite rare. Hackers rely on users to open or install a malicious payload, according to Proofpoint. For all of the attention paid to software vulnerabilities—there are dozens, if not hundreds, published
Read More about More than 99% of attacks in the past year relied on human error to gain accessHow to Check if a Website is Legitimate and Reputable
A 5-Point Checklist 1. Thoroughly Review Seals and Awards Are there security seals? Click on them! – Are they not clickable? – They may not be clickable in the product’s ad (a banner, etc.) -but should be on the company’s
Read More about How to Check if a Website is Legitimate and Reputable4 Ways to Keep the Ghouls & Goblins Away From Your PC
The Ghouls – Internet Hackers “Hackers are attacking PCs with Internet access every 39 seconds.” – Hackers Attack Every 39 Seconds – James Clark School of Engineering at the University of Maryland The Goblins – Free Downloads Based on last
Read More about 4 Ways to Keep the Ghouls & Goblins Away From Your PCNew Coalition Formed to Fight Malware
Three groups set up “Chain of Trust” initiative… read more.
Read More about New Coalition Formed to Fight Malware