A Parent’s Handy Primer on Cyber Vocabulary – Part II Welcome back to our primer! As you may recall, our previous blog focused on cyber vocabulary for the benefit of Internet users. For many of you, these terms may already ring a bell, but we are explaining it to clarify any doubts that may cross […]

The King of Atlantis! The Protector of the Seas and Oceans! A beloved member of the Justice League! It’s none other than Aquaman! While he is most well-known for his ability to control marine animals and breathing underwater, he is also the superhero who poses the biggest threat to you online, according to Intel Security’s […]

Q: I do a pretty good job keeping up with my son online and I try to follow all the tips on your blog. However, every time I ask my 15 year-old son for his phone to check his apps or contacts, a full-blown argument breaks out. I’m to the point where it’s just not […]

Balanced security capability, defense in depth, integrated countermeasures, and a threat-intelligence strategy are critical to defending your business from spear-phishing attacks. Spear phishing continues to be the most successful means of gaining entry to an enterprise network and to valuable business or personal data. According to the latest Verizon Data Breach Investigations Report, two-thirds of […]

The fallout from the OPM breach continues with news that clearance information may have been stolen and that more than 10 million federal employee records may have been breached. In response, the White House has ordered every agency to engage in a “30 day sprint” to shore up and bolster their defensive cybersecurity capabilities. During […]