The Tech Brief, "How can doctors practice better health information security?" provides these protective steps: Update all software, use layered defenses, consider two-factor authentication, choose…
"The perils of passwords and how to avoid them," shows how passwords can be stolen—by phishing, by malware, by hacking, via vulnerabilities. Two-factor authentication (2FA) requires a unique one-time…
In a Tech Brief, "Finance data privacy after Snowden and Target: Implications for credit unions," we see that the "Snowden Effect" is a phrase that seems to epitomize the public's growing concern with…
The Internet is a vast source of information for all of us, and naturally some people use that information for good, and some for ill, like grooming and stalking children. So what things can you as a…
This tech brief covers a compilation of four tips small businesses should explore to prevent cyberattacks: 1) Know what you are defending (Many small firms do not have a clear picture of their digital…
This tech brief covers a compilation of 7 tips you should heed before trusting your data to the Cloud: Know Cloud Provider, Define Business End, Encrypt bits and bytes, Manage Cloud access, Backup…