Mobile Device Security

Modern smartphones, tablets, and other mobile devices are packed with the remarkable power of accessibility. Anything you need is right at your fingertips. But what would happen if one of these mobile devices fell into the wrong hands? While they’re an efficient way to communicate with family and friends, shop or bank online, stream movies […]

Read More

Learn How to Limit Your Personal Information on the Internet

Protecting your personal information is harder than ever, especially when most depend on the internet for personal banking, shopping, socially and professionally networking, and conducting business. Aside from the convenience of it all, your digital footprint is vast. And by putting your personal information out on the web, you’re increasing your vulnerability to identity theft.  […]

Read More

Learn What Keylogging is and How to Protect Yourself Against this Spyware

Sometimes known as keystroke logging or keyboard capturing, keylogging is one of the oldest forms of spyware, spanning back to the days of typewriters. It is designed to record and track anything typed into a device and remains popular among cybercriminals.  Why? By accessing that recorded information, a hacker can harvest usernames and login information […]

Read More

What is NYDFS Cybersecurity Regulation and How is it Being Enforced?

In 2017, the New York Department of Financial Services (NYDFS) put forth a set of regulations placing cybersecurity requirements on all financial institutions – it was titled NYDFS Cybersecurity Regulation (23 NYCRR 500). The regulation includes twenty-three sections defining the requirements for developing and executing an effective cybersecurity program, requires institutions to identify their cybersecurity […]

Read More

How to Recognize a Spoofing Cyber Attack

What is Spoofing? From an information security standpoint, spoofing is when a cybercriminal disguises a phone call, website, email, etc…, for malicious purposes. This person or program successfully falsifies data to misrepresent themselves for their own advantage. Spoofing can be used as a means to gain entry to the target’s personal information or to bypass […]

Read More

What is a Virtual Desktop?

Now with the need for remote technology for flexible working, virtual desktops are as important as ever. So, what is a virtual desktop exactly? Generally speaking, a virtual desktop is a “computer” that lives inside of a server.  For you (the user) it looks, works, and feels exactly the same as the desktop that’s in […]

Read More

Working Remotely – The New Normal: Online Tools that Help

There’s no doubt the Covid-19 pandemic changed the work environment dramatically in a very short period of time. Companies and employees all over the world had to adjust to the “new normal”, like making their home their new office space. Once loud, busy offices have now transformed into simply emailing, slack messaging, and Zoom video […]

Read More
End of content
No more pages to load