Cyber Security

News and Articles About Cyber Security

3 Simple Precautions for Protecting Your Personal Data in the Cloud

3 Simple Precautions for Protecting Your Personal Data in the Cloud

Not one of the celebrities embarrassed to see nude photos of themselves on the Internet had protected their data with basic, two-step authentication.
Why Uncovering a Network Security Breach Can Take Weeks or Months

Why Uncovering a Network Security Breach Can Take Weeks or Months

The discreet methods of hackers make an incursion extremely hard to detect. Both large and small companies are at risk.
Data in Motion is Data at Greatest Risk

Data in Motion is Data at Greatest Risk

Companies grappling with the relentless threat of cyberattacks have to secure the vast amounts of their data moving around with their employees.
How Today's Tech-Savvy Employees Are Challenging the Traditional Role of Corporate IT

How Today's Tech-Savvy Employees Are Challenging the Traditional Role of Corporate IT

The generation just entering the workforce has no patience with their employer's technology if they can figure a hack that makes work easier.
Best Practices for Employees to Protect the Company From Hackers

Best Practices for Employees to Protect the Company From Hackers

With employees working at home and visiting personal sites at work, their guard is often let down. Here's a guide to Internet browsing done safely.
The Celebrity-Hacking Scandal Is a Rude Wake-Up Call on Cloud Security

The Celebrity-Hacking Scandal Is a Rude Wake-Up Call on Cloud Security

As business owners, you have to take responsibility to protect your sensitive documents and photos.
Prepare for the Attack of the Data-Sucking Cyber Zombies

Prepare for the Attack of the Data-Sucking Cyber Zombies

Data breaches are the technology equivalent of burglary, so make a habit of locking up your data.
5 Reasons Merchants Should Start Accepting Bitcoin Now

5 Reasons Merchants Should Start Accepting Bitcoin Now

Coinbase's Adam White lays out the bottom-line benefits of embracing Bitcoin payments.
Protecting Your Computer Against the Threat Posed by Humans

Protecting Your Computer Against the Threat Posed by Humans

Stave off unnecessary data loss at your company resulting from errors made by your own staff.
Home Depot Suffers Possible Data Breach, Tries to Ease Customer Fears

Home Depot Suffers Possible Data Breach, Tries to Ease Customer Fears

The world's largest home improvement retailer may be the latest victim of a credit and debit card breach.
Apple Confirms Some Celeb Accounts Were Breached in Nude Photo Scandal

Apple Confirms Some Celeb Accounts Were Breached in Nude Photo Scandal

The tech giant has broken its silence regarding its probe into the mass leak of naked celebrity images by cyber criminals. Here are the latest developments.
Avoid Labor Day Weekend Travel Scams (Infographic)

Avoid Labor Day Weekend Travel Scams (Infographic)

Don't let your guard down when planning a getaway. Consider these tips to stay safe from criminals and online threats.
8 Mostly Free Best Practices for Tightening Internal Data Security

8 Mostly Free Best Practices for Tightening Internal Data Security

Cybersecurity is a constant worry, but a few commonsense steps protect the company without hurting the bottom line.
Sony Suffers Cyber Attack, Bomb Threat

Sony Suffers Cyber Attack, Bomb Threat

Sony's PlayStation network was shut down for several hours on Sunday while a flight carrying an executive at the company was diverted due to a bomb threat.
UPS Stores In 24 States Hacked, Private Customer Data Possibly Exposed

UPS Stores In 24 States Hacked, Private Customer Data Possibly Exposed

The shipping giant's retail franchise was hit by a malware attack, potentially jeopardizing customer's identifying and financial information. Here's what you need to know.
BYOD Is the Corporate Norm But Data Security Lags Far Behind

BYOD Is the Corporate Norm But Data Security Lags Far Behind

"Mobile device management'' technology for securing corporate data on personal devices severely comprises employee privacy.
Be Sure to Look Around the Office When Searching for Gaps in Your Data Security

Be Sure to Look Around the Office When Searching for Gaps in Your Data Security

High profile data breaches reported in the media rarely point to the significant threats from employees, either disgruntled or negligent.
Beware of a New Kind of Business Identity Theft

Beware of a New Kind of Business Identity Theft

Cyber criminals are hacking into review sites to post false information about a business or illegitimate reviews. Find out what you should do.
John McAfee: You Should Care That Your Privacy Is Disappearing

John McAfee: You Should Care That Your Privacy Is Disappearing

The former fugitive and computer antivirus software tycoon warned that, by letting the Googles of the world intrude on our privacy, we are giving up our freedom as human beings.
4 Ways a CEO May Be Inviting a Cyber Criminal to Attack

4 Ways a CEO May Be Inviting a Cyber Criminal to Attack

Put these digital security tips into practice to safeguard your company's files.
Google’s HTTPS Search Algorithm Update, Keeping User Data Safe

Google’s HTTPS Search Algorithm Update, Keeping User Data Safe

Google is starting to factor HTTPS into its search results.
Google Unveils Project Zero, an Elite Cybersecurity Squad to Fight Hackers

Google Unveils Project Zero, an Elite Cybersecurity Squad to Fight Hackers

'We're hiring,' the company says of its new security outfit, which will work to maintain cybersecurity across the Internet going beyond Google's own workings on the web.
The Phishing Expedition You Want to Avoid This Summer

The Phishing Expedition You Want to Avoid This Summer

Take these 12 steps to avoid an undesired visitor to your company's information or personal data.
A Lack of Communication on Cyber Security Will Cost Your Business Big (Infographic)

A Lack of Communication on Cyber Security Will Cost Your Business Big (Infographic)

IT professionals need to effectively communicate the real risks of data breaches to leaders.
Cyber Safeguard Faces Big Hurdle

Cyber Safeguard Faces Big Hurdle

Two-factor authentication would make online transactions more secure, but there are issues on both the consumer and business sides.

Connect with Entrepreneur

Most Shared Stories