Data Security


Everything You Need to Know About Brandjacking

Everything You Need to Know About Brandjacking

Brandjacking isn't new, but you should be aware of the ways you could be getting scammed.

When Disaster Strikes: Ensuring Your Bank is Equipped to Handle Data Breaches

When Disaster Strikes: Ensuring Your Bank is Equipped to Handle Data Breaches

Banks and other financial institutions must have a security program in place with defined processes in the event of a breach, even when the breach is not the result of any failure of their own. It’s not just best practice – it’s the law.

60 Percent of Developers Don

60 Percent of Developers Don't Trust the Security of their Applications

New research suggests that attacks based on open source code vulnerabilities will increase by 20 percent this year.

Experts Weigh In on Intel Security Vulnerabilities

Experts Weigh In on Intel Security Vulnerabilities

Last week, two major security flaws were discovered in the microprocessors inside nearly all computers.

What Your Business Can Learn From Uber

What Your Business Can Learn From Uber's Mass Security Breach

It seems that Uber is still learning from its mistakes, even as it continues to grow at a rapid rate. But for other companies, the security breach provides a few key lessons.

Major Security Flaws Found to Affect Nearly All Computers

Major Security Flaws Found to Affect Nearly All Computers

The vulnerabilities, which were originally believed to only be in Intel chips, affect a variety of chip vendors and could allow hackers to steal the entire memory contents of computers, mobile devices and services running in cloud computer networks.

4 Email Phishing Scams to Avoid

4 Email Phishing Scams to Avoid

Before you go wading into all your unread emails from over the holidays, it’s a good idea to brush up on phishing email scams, which can lead to financial loss, compromised accounts, identity theft, ransomware infection and insecure data.

Where We Are Headed with Cybersecurity

Where We Are Headed with Cybersecurity

As we enter 2018 and desire to protect both our own personal digital assets as well as critical corporate data, it is useful to examine the anticipated key trends in cybersecurity in 2018.



The Future of Cyber Attacks

The Future of Cyber Attacks

In 2018 we can expect to see continued creativity from nation-state actors, a growing focus on industrial control systems, and efforts to compromise the software supply chain.

A Data Breach in Who-Ville

A Data Breach in Who-ville

This holiday season, however, after a year of nasty data breaches, it feels appropriate to take Dr. Seuss’ How the Grinch Stole Christmas[2] and analyze it with some of the basic questions we ask during a data breach.

What the FCC

What the FCC's Recall on Net Neutrality Means for Cybersecurity

The FCC has voted to roll back an Obama-era Net Neutrality Rules.

Survey of U.S. Physicians Reveals Cybersecurity and HIPAA Concerns

Survey of U.S. Physicians Reveals Cybersecurity and HIPAA Concerns

More than four in five U.S. physicians (83 percent) have experienced some form of cyberattack, according to new survey research released by Accenture and the American Medical Association.

Data Breach Industry Forecast Offers Businesses Predictions and Advice

Data Breach Industry Forecast Offers Businesses Predictions and Advice

Experian’s Data Breach Resolution released its Data Breach Industry Forecast on Tuesday in an effort to help key business decision makers prepare against cybercrime in the year ahead.

Store Data Overseas? What CSPs Need to Know About Microsoft

Store Data Overseas? What CSPs Need to Know About Microsoft's SCA Challenge

An upcoming ruling by the Supreme Court of the United States (SCOTUS) may drastically change how and where CSPs decide to store customer data.

County Slowed Down by Ransomware After Refusing to Pay Hacker

County Slowed Down by Ransomware After Refusing to Pay Hacker

Mecklenburg County, N.C., is working toward fixing its computer systems after refusing to pay a hacker who used ransomware to freeze dozens of local government servers.

Senators Introduce Data Security and Breach Notification Act

Senators Introduce Data Security and Breach Notification Act

The bill comes in the wake of news that Uber handled a breach affecting as many as 57 million consumers by paying the hackers $100,000 in exchange for their silence.

At-Home DNA Test Kits Raise Security Questions

At-Home DNA Test Kits Raise Security Questions

Despite the answers a bit of saliva can provide, some are critical of the at-home test services, questioning the level of security they provide for your most sensitive information.

Apple Patches Mac OS Security Bug

Apple Patches Mac OS Security Bug

Apple has patched a macOS High Sierra flaw that would allow intruders to gain full administrator access on your system.

5 Ways to Protect Your Accounts from Hackers

5 Ways to Protect Your Accounts from Hackers

Being online puts you and your data at risk, but there are ways you can minimize your risk and make a hacker’s job harder.

Featured

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.