Cybersecurity http://www.entrepreneur.com/topic/cybersecurity The latest news, videos, and discussion topics on Cybersecurity en-us Copyright 2014 Entrepreneur.com Inc., All rights reserved. Entrepreneur.com webmaster@entrepreneur.com (webmaster) 5 Business Tue, 23 Sep 2014 20:00:00 GMT 4 Ways Adopting Apple Pay Can Benefit Small Business Apple Pay just may revolutionize cashless payments. Tue, 23 Sep 2014 20:00:00 GMT http://www.entrepreneur.com/article/237719 http://www.entrepreneur.com/article/237719 Rob Bertke 6 Steps to Create an Effective BYOD Plan (Infographic) Increase employees' productivity and protect your company's data with these tips for building a safe 'bring your own device' plan. Thu, 21 Aug 2014 17:44:00 GMT http://www.entrepreneur.com/article/236723 http://www.entrepreneur.com/article/236723 Nina Zipkin Be Sure to Look Around the Office When Searching for Gaps in Your Data Security High profile data breaches reported in the media rarely point to the significant threats from employees, either disgruntled or negligent. Mon, 18 Aug 2014 11:00:00 GMT http://www.entrepreneur.com/article/236162 http://www.entrepreneur.com/article/236162 Robert Siciliano Slow Wi-Fi? 5 Easy Ways to Boost Your Signal Now. A roundup of user-friendly tips, tricks and tools to improve your Wi-Fi router’s range and speed -- beer-can hack included. Thu, 14 Aug 2014 19:11:00 GMT http://www.entrepreneur.com/article/236530 http://www.entrepreneur.com/article/236530 Kim Lachance Shandrow 4 Tips to Thwart iOS Attackers Your iPhone has robust security features that you will really wish you'd have used if your phone is hacked. Mon, 11 Aug 2014 21:00:00 GMT http://www.entrepreneur.com/article/236334 http://www.entrepreneur.com/article/236334 Troy Hunt Protect Yourself: Turn On This Security Feature in Your Mobile Banking App Sure, mobile banking apps let you track your cash on the go, but they can also help you protect it, too. Here's how. It's easier than you might think. Wed, 23 Jul 2014 13:00:00 GMT http://www.entrepreneur.com/video/234698 http://www.entrepreneur.com/video/234698 Kim Lachance Shandrow Threat of Data Breaches Creates Lucrative Opportunities in Cybersecurity The unblinking vigilance required to protect data systems is creating opportunity for job seekers and entrepreneurs. Mon, 21 Jul 2014 18:00:00 GMT http://www.entrepreneur.com/article/235731 http://www.entrepreneur.com/article/235731 John Trobough A Lack of Communication on Cyber Security Will Cost Your Business Big (Infographic) IT professionals need to effectively communicate the real risks of data breaches to leaders. Wed, 02 Jul 2014 20:00:00 GMT http://www.entrepreneur.com/article/235318 http://www.entrepreneur.com/article/235318 Ethan Oberman Cyber Safeguard Faces Big Hurdle Two-factor authentication would make online transactions more secure, but there are issues on both the consumer and business sides. Mon, 30 Jun 2014 22:30:00 GMT http://www.entrepreneur.com/article/235243 http://www.entrepreneur.com/article/235243 Thorsten Trapp CEOs Can No Longer Sit Idly By on Cybersecurity Target's dismissal of its top man is proof that executives ignore tech breaches at their own peril. Fri, 16 May 2014 19:00:00 GMT http://www.entrepreneur.com/article/233911 http://www.entrepreneur.com/article/233911 Eric Basu 8 Ways to Protect Yourself From Microsoft's Dangerous Internet Explorer Bug Take these quick, easy steps to fend off hackers taking advantage of a serious flaw in the popular web browser. Mon, 28 Apr 2014 18:52:00 GMT http://www.entrepreneur.com/article/233467 http://www.entrepreneur.com/article/233467 Kim Lachance Shandrow How to Create a Super Strong Password (Infographic) In the wake of the recent Heartbleed SSL bug revelation, it's more crucial now than ever to update all of your online passwords. Here's how in one easy, neat and tidy infographic. Fri, 18 Apr 2014 10:31:00 GMT http://www.entrepreneur.com/article/233214 http://www.entrepreneur.com/article/233214 Kim Lachance Shandrow Stranger Danger: 3 Good Reasons to Reject a LinkedIn Connection Request No, you're not mean. Just smart. Sometimes it's okay to ignore connection requests on the world's most popular career social networking platform. Here's when you probably should. Thu, 17 Apr 2014 15:46:00 GMT http://www.entrepreneur.com/article/233176 http://www.entrepreneur.com/article/233176 Kim Lachance Shandrow 4 Ways to Protect Yourself From the 'Heartbleed' Bug While the 'Heartbleed' bug is causing pandemonium in the online world, individuals need to stay calm and protect their personal information. Fri, 11 Apr 2014 11:00:00 GMT http://www.entrepreneur.com/article/232977 http://www.entrepreneur.com/article/232977 Chris Hutchison Yahoo Unveils Massive New Encryption Scheme to Protect Users Online privacy champion Alex Stamos is making it a lot tougher for hackers and spies to snoop around Yahoo's insides. Here’s what you need to know. Thu, 03 Apr 2014 21:32:00 GMT http://www.entrepreneur.com/article/232807 http://www.entrepreneur.com/article/232807 Kim Lachance Shandrow 3 Biometrics Startups Heating Up the Password Security Race A look at the young companies making it possible to unlock your tech with your face, heart, finger and voice. Mon, 31 Mar 2014 12:00:00 GMT http://www.entrepreneur.com/article/232627 http://www.entrepreneur.com/article/232627 Kim Lachance Shandrow Tumblr Gets a Security Upgrade The blogging platform added two-factor authentication to protect users from hack attacks Tue, 25 Mar 2014 17:19:00 GMT http://www.entrepreneur.com/article/232526 http://www.entrepreneur.com/article/232526 Nina Zipkin This Startup Wants You to Know When a Cyberattack Is Coming Google Ventures-backed ThreatStream has developed a real-time intel-sharing system that lets institutions detect and fight against cyber threats. Mon, 24 Mar 2014 10:30:00 GMT http://www.entrepreneur.com/article/232410 http://www.entrepreneur.com/article/232410 Kim Lachance Shandrow Coinbase Snags Top Tech Execs From Facebook, Amazon The rising wallet service's major new hires show that the business of Bitcoin is big enough to attract top tech talent. Thu, 20 Mar 2014 14:47:00 GMT http://www.entrepreneur.com/article/232364 http://www.entrepreneur.com/article/232364 Kim Lachance Shandrow Our Collective Mobile Security Blind Spot With business continuing its shift from the desktop to smartphones and tablets, more than half of all companies now have sensitive information stored on mobile devices. Fri, 14 Mar 2014 16:00:00 GMT http://www.entrepreneur.com/article/230877 http://www.entrepreneur.com/article/230877 Jason Ankeny