Main Logo

information technology

Cell Phone Privacy

5 Apps for improving your phone’s data security

Ascend Education recently released part three of its series on the top smartphone security threats today. The article tackles cyber threats like screen lockers and ransomware. Considering that the topic is already in its third edition, it’s clear that our data can be compromised in creative and unexpected ways via our phones. It’s important to note that educating yourself on these threats is the first step to creating better security for you and your devices, as hackers can easily exploit a lack of understanding when it comes to cyber threats.

Data security

Data loss prevention – Part 2

Our last post examined the important concepts of what Data Loss Prevention (DLP) is.  In this post, we now examine the required controls that are needed to safeguard these datasets, as well as the important features you need to look out for as you pick a particular DLP solution for your business.

Adobe girls laughing in computer class scaled e

Trends in online education in 2018

Online education is continually growing in the United States. Many experts have conducted research on the progression and direction of online education. USNews reported on this flexible alternative to traditional college courses by stating four trends that students should watch out for in 2018.

Data security

Avoiding card skimmers at the pump

Many of us have heard of fuel dispensers being a target for card-skimming devices.  Brian Krebs wrote a post on his blog “Krebs on Security” on how to avoid these card skimmers, and he uses the San Antonio Police Department as a source for tips. Some of these tips include using only new fuel dispensers that have a horizontal card slot accompanied by a raised metal keypad and using only credit cards at the pump. To read the rest of his great post, check out the link above.

Data loss prevention

Data loss prevention – Part 1

To any business or corporation, information and data are the blood flow of daily operations.  This consists of market intelligence as it relates to your competition, the sensitive customer information (such as contact info, credit card/banking numbers, etc.) and even your own internal data.  Safeguarding all of this data is a must, not only from it being hacked into, but also by making sure that only the authorized employees have access to it.