On February 12, 2019, The Federal Trade Commission (FTC) release an article warning of the dangers of the Romance Scams. In a Romance Scam, cyber criminals gain the confidence/trust of their ...
Posts for category: Best Practices
DNS allows a user to type a Uniform Resource Locator (URL) into the browser which sends the user the requested website. In the background, DNS servers are communicating with each other to resolve ...
Businesses are highly affected by email scams. One scam reaching critical level is the W-2 scam. The scam is aimed toward the HR department of an organization using sophisticated phishing ...
Background – Considered one of the most crucial assets in a company, access control systems hold significant value. The term ‘access control’ refers to “the control of access to system ...
Background – Today, there are still people who use the same passwords across their online accounts. Often times, passwords are only changed when they are forgotten. Identity theft is a result ...
Data Breaches – What You Can Do
Background – A security incident where information is accessed without authorization is also known as a data breach. Data breaches are a costly expense that can hurt consumers and businesses in ...
Background- What is a SIM card identity theft? Basically, it is the stealing of your mobile identity. This fairly new way of identity theft/fraud is appearing everywhere. The list of attacks to ...
Background- Cyber-attacks are becoming a more serious issue by the year. Today, there is no arguing with the facts: attacks are more frequent, sophisticated, widespread, and costly than ever. In ...
Biometrics Authentication (3FA)
Background- Sometimes two-factor authentication is not enough. By using “something you know” – username and password, along with “something you have” – hardware token, SMS, software ...
Protect Your Online Accounts with Two-Factor Authentication
Background- Majority of people today have many different online accounts like: Facebook, Instagram, Twitter, banking accounts, email, etc. Each of these accounts have information about your ...