Recent Entries

Setting Up Your Gadgets Securely
Video Thumbnail: Setting Up Your Gadgets Securely

Setting Up Your Gadgets ...

It’s that time of year again – the last quarter of the year is a time for many of us to buy a new smartphone, as we look at the new devices launched relatively recently by Apple, Samsung, and all the other phone providers and decide which one we shall use for the duration of our next smartphone contract. I’m sure that many of us will take home brand new iPhones and Android devices and set it up just the way we want our personal devices to be. We should take a minute to remember, however, that because these devices are so personal to us, the damage a hacked smartphone can do to is significant. Imagine what would happen if a hacker stole your personal data. We don’t have to imagine, however, as this has happened to many users in 2014. At the very least, this is embarrassing to the...
Data Breaches: Almost Like Clockwork
Video Thumbnail: Data Breaches: Almost Like Clockwork

Data Breaches: Almost Li...

Last year, as part of our predictions for 2014 we said there would be one major data breach every month. At the time, many people said that our prediction was overly pessimistic. It was one prediction I would have been happy to have gotten wrong. Unfortunately, I haven’t been proven wrong. We’ve seen major data breaches hit large institutions left and right. In many cases, these breaches have been due to attacks of point-of-sale (POS) malware that hit these companies. In other cases, attackers got into their networks directly and stole the information of their users. People may think that financial information is the most valuable information that can be lost, but that’s not always the case. Banks and other financial institutions are very good about not letting consumers eat the...
To Mobile App Developers: Compete on Privacy and Security, Too
Video Thumbnail: To Mobile App Developers: Compete on Privacy and Security, Too

To Mobile App Developers...

There are many mobile app developers today who want to develop the next hot mobile app. After all, if you pay your cards right, you could end up being bought by a much larger company like Facebook, Google, or Microsoft for billions of dollars. It’s hard enough to build a mobile app that will have the features and ease of use that will make it popular with millions of users. There are other things that apps can compete on, however: this includes the privacy and security of their users. How can developers do this? First of all, consider how the app is written. Are best practices being followed? Developers on PCs and Macs have already learned that their apps can suffer from vulnerabilities that can be exploited. Are you doing your best to avoid these issues? One reason to harden your apps...
Rebuilding Trust: Is Your Data Safe?
Video Thumbnail: Rebuilding Trust: Is Your Data Safe?

Rebuilding Trust: Is You...

For the past year or so, I’ve noticed that people are increasingly concerned about how protected their information is – not just from hackers, but from governments and large Internet companies as well. Individual users and organizations are now saying – more than ever before – that privacy and security matters. Of course, the desire for privacy and security is sometimes trumped by the desire for added convenience and features. However, one thing that will cause changes in how data is protected is government regulation. In some quarters, it is perceived – rightly or wrongly – that private companies cannot be trusted with the data of their users, and that the government must step in with regulations. The European Union is planning new regulations that will control how...