Author Archives: Amanda Young
- Home
- Articles Posted by Amanda Young (Page 2)
The Price of Convenience – Part 3
Data Privacy, Compliance, and Policy It’s no secret that organizations around the world collect and analyze personal information. It’s also no secret that the data usage practices of some organizations ushered in concerns about privacy, shininga focus on several key questions: What data w
The Price of Convenience – Part 2
Mobile App Security Smartphone applications harness an amazing combination of connectivity and convenience. That combination also makes them a top target for cybercriminals who view apps as opportunities.Protect the computer in your pocket by adhering to these app security essentials: Researc
So, what, exactly, is Malware?
Listen to the news? Read the internet? You know cyber crime is a very big business. Hackers and criminals are out there doing all sorts of nefarious things. Most generally, you hear that malware is some kind of virus that attacks your software programs, infects your hardware, and bungles up your n
What exactly is Malware? A definition and some common types.
So what happens when you get software that has been mixed with a strong dose of malicious intent? You get malware, the term used to describe all manner of software invasion that has been designed to do bad things to your computers, networks and digital devices. It may have been created to steal so
Protecting yourself against poison attacks
Data poisoning by way of logic corruption, data manipulation and data injection happen when the attacker finds a way to access your data set. The kind of poison attack varies depending on the level of access the attacker is able to achieve Here’s what you can do to ensure such access is prevented.
DR Testing
PLAN TESTING & MAINTENANCE While efforts will be made initially to construct this DR Plan is as complete and accurate a manner as possible, it is essentially impossible to address all possible problems at any one time. Additionally, over time the Disaster Recovery needs of the organiza
Poison Attacks: A quick overview
Smart technology is everywhere. Not just in our offices, but even in our day-to-day lives with tools like Google Home and Alexa becoming commonplace. With technology becoming smarter every minute, the risks are increasing by the minute as well. Cybercriminals are finding new ways to corrupt our IT n
Employee Training and Cybersecurity
Studies show that 91% of cybersecurity incidents result from human error. Employee training will form a big part of the cybersecurity initiative that you will take on as an organization. You need to train your employees to identify and respond correctly to cyberthreats. Here are some employee traini