<img src="https://secure.seem3pick.com/198073.png" style="display:none;">

SecureWorks finds & exposes phishing Russian hacker group APT28

Posted by Steven Lai on Sat, Apr 08, 2017

 

A department from SecureWorks; a protective service unit that protects individual's or businesses digital information, has been closely watching a well known group of Russian hackers. 

Russian_Hacker_group_APT28

Read More

Topics: Disaster Recovery, cybersecurity

What!? Congress wants you to Pay for online privacy?!

Posted by Steven Lai on Fri, Apr 07, 2017

 

As a new policy that has been placed about precious information being collected from customers, it has caused negtaive reactions from online consumers.
Outrage sparked as the payment for online consumer privacy has been established after a vote down had been made by congress. Internet users will have to pay a "privacy tax" in order for them to protect their privacy.
Congress_Votes_Against_Online_Consumer_Privacy
 

Types of information being collected that caused the outrage?

 As the part of the rules is being established, broad brand providers will need to take "reasonable" steps to collect and protect customers information.  
Read More

Topics: cybersecurity

What is Data Mapping Software?

Posted by Robert Cordray on Thu, Apr 06, 2017

Data mapping is typically the first step in integration of different data models. The process is used in data warehousing to link data sets according to specific data element definitions. The standards used depend on the domain values of the model used.

Read More

Topics: Data Security, data storage, data mapping

The top ten features the Android O update has to offer

Posted by Steven Lai on Wed, Apr 05, 2017

On March, 21st, Google announced and released a preview version of the Android O.

Read More

Topics: New Technology

10 Tips On How To Avoid SMiShing (SMS Phishing)

Posted by Steven Lai on Tue, Apr 04, 2017

Mobile devices are used thousands of times every day by billions of people. Everyone now socializes through apps and text messages. Mobile devices are a great tool to connect with one another, however privacy and cyber hackers can be risk factors to consider when thinking about Cyber Security.

Read More

Topics: cybersecurity, email security, SmiShing