BlogHeaderFinal.jpg

Cybersecurity Tips. Part 3: Digital Hygiene

Posted by Matt Shaheen on Apr 5, 2018 9:36:33 AM

This is the third installment of a three-part series on cybersecurity advice. In part 1, I covered general awareness and protection of personal devices. In part 2, I covered ways to protect yourself in online interactions. In this third and final post, I will focus on ways to practice good digital hygiene such as backing up data, managing passwords, keeping data clean and managing your social media information.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Smartphone Security, Computer Security, Cyber Hygiene

Cybersecurity Tips. Part 2: Online Behavior

Posted by Matt Shaheen on Mar 21, 2018 8:30:00 AM

This is the second portion of a three-part series on Cybersecurity advice. In Part 1, I covered general awareness and protection of personal devices. In this post, I will focus on online interactions and provide advice to help ensure you are safe, secure and private in the online world.

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Smartphone Security, Computer Security, Online Behavior

Cybersecurity Tips. Part 1: Awareness

Posted by Matt Shaheen on Mar 5, 2018 6:30:00 AM

When I started my career over 20 years ago, I was issued a corporate laptop with a phone-line dial-up modem and a beeper. For years, the computer was the only device I connected to the corporate network. The computer was provisioned to me complete with corporate standard software and all of the necessary security controls built in. The software was kept up to date by my IT department and the only things I had to do were keep the device physically safe from thieves and avoid losing it. Fast forward to today and things look much different. With the emergence of BYOD (Bring Your Own Device), more personal machines are connecting to the private networks of organizations without the oversight of IT. The presence of these devices increase the risk of exploitation from the outside. Chief Information Security Officers (CISOs), who are responsible for keeping enterprise networks safe, face challenges with this new paradigm. The days of relying on the IT department to handle everyone’s cybersecurity needs are gone. It has become imperative for all of us to take a more active role in maintaining the right cybersecurity measures for ourselves. By paying attention and doing work to set things up properly, you can keep yourself and your livelihood safe. After all, like a chain with several links, your corporate security is only as strong as its weakest link. Do you want to be the weak link?   

Read More

Topics: Mobile Security, Mobile Surveillance, Smartphone Vulnerabilities, Smartphone Security, Computer Security

Time to Defend Gift Mode!

Posted by Dan Hill on Dec 14, 2017 10:00:38 AM

My Strategy for Defending Christmas against the Internet Titans.

Read More

Topics: Data Privacy, Computer Security

11 Best Practices for Computer Security

Posted by Julie DexterBerg on Nov 30, 2017 7:00:00 AM
Computer Security Day. At last a social media holiday that offers an opportunity to take stock of the technologies that enable everyone’s socialness to check your current computer security posture. And this includes your smartphone.
Read More

Topics: Mobile Security, Computer Security

A blog about protecting your smartphone from mobile surveillance, which can reveal your most important and sensitive personal and professional information. Whether you work at the highest levels of defense and intelligence, are a corporate executive, a medical or legal professional or a barista at a local coffee shop, what’s important to you is worth protecting. Check back here often for the latest information on how to protect that information as well as your personal privacy.

Subscribe to Email Updates

Recent Posts