CyberSecurity


Data Secure

The risk posed by hackers to the Internet of Things (IoT) is a hot topic and there have already been some serious real-world attacks.



Not a Catch-all

Not a Catch-all

When used effectively, biometrics can contribute to safer cybersecurity practices.

Chipotle Releases Nationwide List of Breached Stores

Chipotle Releases Nationwide List of Breached Stores

Chipotle has released a nationwide list of stores that were targeted in the security breach between March and April of 2017.

China to Launch Controversial Cybersecurity Law This Week

China to Launch Controversial Cybersecurity Law This Week

Companies are asking China to delay the implementation of a new cybersecurity law amid concerns of how the legislation will affect personal information and cloud computing.

How to Protect Yourself From WannaCry

How to Protect Yourself From WannaCry

The WannaCry attack started last Friday and has affected 200,000 computers in almost 150 countries around the world.

More Victims Expected in Worldwide Cyberattack

More Victims Expected in Worldwide Cyber Attack

Cybersecurity experts expect there will be more people falling victim to the worldwide cyberattack that hit on Friday.

UK Hospitals Report Cyber Attack

UK Hospitals Report Cyber Attack

Several British Hospitals say they are experiencing major computer problems as the result of a breach in cybersecurity.

President Trump Signs Cybersecurity Executive Order

President Trump Signs Cybersecurity Executive Order

President Trump has signed an executive order to strengthen the government’s cybersecurity.

French Presidential Campaign Sees Breach Similar to Hack that Plagued American Election

French Presidential Campaign Sees Breach Similar to Hack that Plagued American Election

Just days ahead of the French Presidential Election, candidate and now France’s president-elect announced his campaign had been hacked.

World Password Day: Fact or Fiction

World Password Day: Fact or Fiction

It’s time to take the pledge to improve your password habits.

Google Docs Hit by Phishing Attack

Google Docs Hit by Phishing Attack

Don't edit that Google Doc, at least not today.

Layered Approach

Layered Approach

The IT approach to layered security for systems, infrastructure and data is increasingly impacting the security department, and with good reason.

Grant Management

In Kaua’i County, Hawaii, grants management has long been an important part of local government operations. It’s also been handled using paper.

Not a Catch-all

Not a Catch-all

While the technology can add an effective, additional layer of cybersecurity, it’s not a catch-all. In fact, the very nature of biometric technology can introduce additional security gaps.

Chipotle Reveals Potential Breach in Data Security

Chipotle Reveals Potential Breach in Data Security

Chipotle customers may have more to complain about than just an extra cost for guacamole.

Uber Can Track Devices, Even After You Delete the App

Uber Can Track Devices, Even After You Delete the App

Uber knows where to find you even if you do delete the app.

Why Protecting Your Tax Data Is More Important than Ever

Why Protecting Your Tax Data Is More Important than Ever

In recent years a disturbing new trend is on the rise – cybercrime relating to tax returns and tax-related data. For its victims, Tax Day represents inconvenience and loss.

DDoS downfall: How the IoT is Becoming the Internet of Very Bad Things

DDoS Downfall: How the IoT is Becoming the Internet of Very Bad Things

This age of connectivity is the age of possibility, and millions of people all over the world are taking advantage of the wonderful benefits these devices have to offer.

How to Operationalize Security with Enterprise Wide Engagement

How to Operationalize Security with Enterprise-Wide Engagement

How to Prevent Breaches, Not Just Clean Up the Mess

Educating End Users

As a provider of storage for video surveillance systems, the hardest part of my job is educating end-users, integrators and consultants on the best way to purchase storage for their systems.

Featured

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.