In March 2018, disturbing reports circulated on the web that revealed a company named Cambridge Analytica harvested confidential details of 50 million Facebook accounts. If you’re concerned that your private details are being passed around by private companies, consider the following 3 tips to maintain a confidential Facebook profile.
3 tips to maintain a secure Facebook account
Secure PHI with tech defenses
News regarding hospital data breaches that disclose thousands of medical records emerge at a distressing rate, yet these attacks shouldn’t really come as a surprise. All this valuable data will cost a hefty price on the black market, which makes them great incentives for cybercriminals.
Does private browsing secure your data?
If you’re getting targeted with surprisingly relevant ads, there’s a chance your internet activity is being tracked and analyzed by market researchers. While this doesn’t bother most people, private browsing mode can offer you some protection against online marketers and would-be data thieves.
Prep for IT incidents with external support
Regardless of your best office IT strategies, it's nearly impossible to thwart every type of cyberattack. And when they do happen, most businesses depend primarily on their internal resources and personnel. On the other hand, some organizations have realized the risks and complexities involved and have sought external support from leading industry specialists.
Top Android P improvements you need to know
Every year, Google pushes out a major Android update filled with new features and improvements. Although this year’s update, Android P, is still not out for you to enjoy, Google did give a sneak preview of the new improvements.
Indoor positioning
If you’re having trouble finding your way around a huge complex like a mall or factory, Android P can help with a feature called WiFi Round-Trip-Time, which triangulates your device’s position in relation to the building’s WiFi access points.
Why hypervisor security is important
Virtualization has become essential for business looking for better resource provisioning, easier IT management, less hardware, and lower costs. But virtualization is a complex and constantly evolving field, which comes with certain risks. One such risk concerns hypervisor security.
iPhone security impenetrable no more
Cellebrite claims that they have devised “undisclosed techniques” to unlock Apple devices running on any iOS operating system. The U.S. government contractor based in Israel recently notified clients of their ability to circumnavigate iOS protections that’s part of their new service for forensic specialists and law enforcement.
HTTPS is something to care about
For all the time we spend discussing the complexity of internet security, there are a few simple things you can do. Avoiding websites that aren’t secured with the HTTPS protocol is one of them. It’s a habit that can be developed with a better understanding of what the padlock icon in your web browser’s address bar represents.
Google suggests business-friendly phones
If you’re in the market for a new Android phone but overwhelmed with the number of options available, Google can help. They’ve recently published a set of standards of what constitutes a ‘business-friendly’ phone and has created a short list to help you decide.
How to avoid Spectre & Meltdown attacks
Hospitals and clinics have been storing confidential medical files and patient data in highly protected servers. But unless patches are being installed, Spectre and Meltdown attacks could undermine the security of healthcare providers.
Why is Spectre and Meltdown a big problem for healthcare providers?
Spectre and Meltdown are security flaws in computer chips that give hackers access to all data saved in the server, circumventing even encryption and multi-layered security systems.