Think fast: Can you name five people who don’t have a cellphone? How about just one? We’re betting that you probably cannot. Surveys conducted by Pew Research Center show that the “vast majority of Americans – 96% – now own a cellphone of some kind.” Furthermore, in 2019, “roughly one-in-five American adults are ‘smartphone-only’ […]
Search Results for: breach
Machine learning: What it means for cybersecurity
What if your boss or client came to you with the following question: “Can you tell me how Twitter hashtags, our current road construction and the weather conditions are affecting the sales of Product X?” Could you do it? Enter: Machine learning. Machine learning is the idea of taking collections of data sets that […]
Tax scams to look for in 2019
Ah, tax season. Shortly after the chaos of the year-end holidays and the refreshing new start that comes with the new year, we are forced to crunch numbers, do tedious paperwork and take a long, hard look at our own financial landscape of the year before. For the gifted few, taxes (and all the […]
Cybersecurity in 2019: What to expect
The world saw a lot of stirrings on the cybersecurity front this past year, everything from the EU passing their General Data Protection Regulation (GDPR) with international implications, to Russian hacking and voter tampering, to data breaches galore. With 2018 rapidly coming to a close and 2019 right around the corner, all of us at […]
2019 Cybersecurity resolution checklist
Don’t worry, we aren’t talking about cutting out fast food or making sure you get enough water intake every day. On this week’s episode of Looking to 2019, we’re talking about cybersecurity resolutions. The need for up to date security practices and protocols (in both your personal and professional lives) will be greater than […]
Trick or threat: 6 Common cyber-attacks that we should know by now
If you’re familiar with the Secure360 blog, you know that we like to dig deep into the many cogs of the security machine. We like to dissect complicated topics like threat hunting and penetration testing and tear them down to bite-sized pieces of valuable information that everyone can understand. Today however, we’re going to […]
Cybersecurity and the NFL: What can go wrong and how we can prevent it
Well everyone, it is officially the most wonderful time of the year. No, we aren’t talking about the sparkling, glimmering, holly jolly holidays that the aforementioned song is written about. We’re talking about football season. After a long and hot summer, it’s about time. It would seem that we’ve got a record-breaking couple of months […]
Your summer cybersecurity soundtrack: Podcasts
For many, their summer soundtrack consists of upbeat playlists that are played just a little too loud during long commutes and road trips. For others, an informational podcast will do the trick. If you have any interest in the security industry, get a pen and a piece of paper to write down your carefully curated […]
Staying cyber safe during summer months
It’s finally that time of year we’ve all been waiting for and it appears to be in full swing; the sweet season of summer! This season is often met with intentionality as we only have about 90 days to make it count. Families and individuals are taking planes, pitching tents, exploring new cities, attending concerts […]
The risks of a weak business continuity plan
With the exponential evolution of the technology age, people and businesses are able to do more, do it faster, and do it better than ever before. While these technological advancements mean increased productivity and output for organizations, they also put those very same organizations at risk. In other words, it isn’t enough to just protect […]