Marcus Sheridan’s book, They Ask You Answer, inspired me to reevaluate addressing customer questions online. Needless to say, I figured last week’s dustup around the compromised Ring video camera feed in an 8-year-old’s bedroom would be a... Read More
Join Rich Valdez and Ted Hicks as they moderate the #LNPShow that discusses the latest trends and game changers in parenting, technology, education, sports & product reviews.
Neel Grover – (CEO of INDI)... Read More
We’re just days away from one of the most exciting and sensationalized sporting events of the year — Super Bowl Sunday! Do you have your cybersecurity game plan in place?
In the world of cybersecurity, the playbook is all about assembling the... Read More
In an end-of-the-year cybersecurity survey, parents say “fake news” now competes with online sexual predators and social media as Internet dangers facing their children in 2018.
Global cybersecurity leader Panda Security surveyed 1000 U.S. parents... Read More
Whether you use your computer for playing games or online banking, protect your data and privacy by avoiding these cyber security mistakes.
1. Having the same password for everything – you should always try to have different passwords for... Read More
Before I get to the device, let me admit to something up front. I’m a computer guy by trade. I’ve installed and/or managed countless PC’s, servers, routers, firewalls, etc in both homes and businesses. I say this to mean that I wasn’t walking... Read More
Every month, almost 1.5 million new phishing websites are created. This is according to a new report by Webroot, showing just how big of an industry phishing really is.
The Webroot Quarterly Threat Trends Report says that 1.385 million new... Read More
Ransomware is the digital version of extortion. It’s as simple as that. It uses age-old tactics to carry out a modern day crime, but the elements behind it are as old as
human criminal activity itself.
... Read More
Cyberthreats to your business are usually blamed on outsiders—nefarious programmers writing malicious code designed to pilfer your corporate intelligence, siphon your confidential customer information and/or raid your financial data. Sometimes, the... Read More
Players and staff with the Milwaukee Bucks had their 2015 W-2 records compromised, after a staffer with the NBA franchise released the records to an email address spoofed to appear as if it came from team president Peter Feigin.
In a statement... Read More
So you don’t think you need a security code on your phone?
I’m an IT guy by profession, so computer and device security has always been important to me. I have passwords on everything I use, lock codes, swipe patterns, if it’s an... Read More
FCC RELEASES NEW “SMARTPHONE SECURITY CHECKER” TO HELP CONSUMERS PROTECT MOBILE DEVICES
ONLINE TOOL CREATES 10-STEP ACTION PLAN FOR CONSUMERS, INCLUDING TIPS ON SETTING PASSWORDS, BACKING UP DATA, AND HOW TO REPORT STOLEN PHONES
MOBILE SECURITY... Read More