Two Frightening Zero-Day Exploits to Make Sure You Never Sleep Again
How bad can a zero-day exploit get? As it turns out, pretty freaking terrible. Zero-day exploits are vulnerabilities in applications, firmware, and operating systems that are exploited before even the original developer of the targeted platform is aware of the...
5 Things You Need to Know about the T-Mobile Data Breach and SIM Swapping
The recent T-Mobile data breach(es) was one of the largest in history, affecting over 50 million customers. The hackers were able to access customers' names, dates of birth, social security numbers, and other sensitive information. Most importantly, the hackers got...
Why Business Email Compromise is the Cyber Criminal’s Most Devastating Weapon
You’ve probably heard stories like this one before: A person in a business is supposed to send a wire transfer to another business. They receive an email at the last minute, often with a panicked tone, making an urgent request – their primary bank account is...
The Best Multi-Factor Authentication Setup to Immediately Improve Your Security [Podcast]
Proving who you are is the primary goal of most cybersecurity systems. The best way to accomplish that task is through Multi-Factor Authentication. The primary purpose of cybersecurity systems is to protect data from those who are not authorized to get it. Therefore,...
3 API Best Practices You Need to Start Using Immediately
In today's fast-paced digital landscape, APIs have become the backbone of software integration and innovation. With an ever-increasing reliance on APIs, the need for robust security measures and the use of API Best Practices has never been more critical. As T-Mobile...
APIs – A Powerful, Versatile Tool and Your Achilles Heel, All in One
T-Mobile recently announced that hackers had breached their systems and stolen the records of 37 million customers. While the records apparently didn’t include financial information, enough personal information was taken to create significant risks for the victims....
Encryption 101: 4 Useful Concepts You Need to Know [Podcast]
4 Basic Concepts. 15 minutes. That’s it. That's all the time you need to understand how encryption works in the modern ecosystem. It's an important tool for protecting data, it's required by countless laws, regulations, rules, and contracts. But do you really know how...
The 6 Best Password Managers for Individuals and Families in 2023
We all have multiple online accounts that require us to create user accounts with a login and password. The days of reminding you not to use your pet’s five-letter name on all of your accounts should be long gone, and hopefully you’re at least making an effort to keep...
8 Easy Steps You Can Take Right Now to Secure Your Personal Privacy and Identity [Podcast]
How can you ensure that your identity and your personal privacy are protected online? The answer likely isn’t going to be what you want to hear: You have to make sure it’s protected. You do. You can’t rely on anyone else. It's true, there are threats everywhere, and...
The Best Personal Cloud Backup Services to Protect Your Data
We live our lives on our computers and our mobile devices. It’s not even just a matter of where and how we keep our “data,” because what we keep on these systems is, for most people, the tools necessary for daily life and the memories of all the days past. How would...