A survey recently sponsored by Comcast shows that free WiFi is now one of the best things that a small businesses can offer to their customers. This survey included responses from over 600 employees and managers at companies with fewer than 100 employees.
Tagged: data protection
Although some people may believe “cloud storage” has something to do with weather fronts, it’s simply an easy way for anyone to save data with a remote, third-party database. And it’s becoming more and more mainstream. Any time you use Gmail to send an email, or upload photos to Shutterfly, as just two examples, you’re entrusting your personal and sensitive information to cloud storage.
In the age of smartphones, why would anyone want to use an outdated New York City payphone? To connect to a free WiFi hotspot, of course! That’s what NYC Mayor Bill de Blasio is counting on as he embarks on a bold plan to create one of the largest public WiFi networks in the country. Politicians and public interest and trade groups are jumping on the payphone hotspot bandwagon. But wait a minute! Is anybody thinking about security, which is non-existent at WiFi hotspots?
Malicious insiders and criminal attacks are a growing concern for businesses, especially when we consider how persistent data has become in the age of cloud and mobility. After all, a data breach can result in enormous damage to a business that goes way beyond the financials. At stake is customer loyalty and brand reputation.
Last week, the Obama Administration released a 90-day study commissioned by the President on big data and privacy. This study was part of President Obama’s response to the NSA surveillance scandal and its aftermath. Led by White House counselor John Podesta, the report details concerns over how big data can be used to target consumers and lead to discrimination, among other things.
Investigative reporter Julia Angwin, author of Dragnet Nation: A Quest for Privacy, Security and Freedom in a World of Relentless Surveillance, knows a lot about Internet snooping.
We as a society have come to expect an extreme amount of online tracking. But how much is too much? And is there a way around it?
Verizon just released its highly anticipated 2014 Data Breach Investigation Report (which reports on security incidents for 2013) and it contains some bad news: the bad guys are getting better and better at hacking into our computers and network servers.
From the “too ridiculous to be true” files — especially given the increasing number of data breaches at companies large and small — is the news that the most common corporate password is “Password1” because it just barely meets the minimum complexity requirements for length, capitalization, and numerical figures.
This data is from a report that shares the 7 biggest pitfalls and perils of corporate online security. Turns out that the costs of lost reputation, brand value, and tarnished image are just as serious as the financial ramifications of cleaning up a corporate data breach.
Have you heard about the Digital Shadow tool, a promotion for the game Watch Dogs? The folks behind Digital Shadow allege that “you are not an individual, you are a data cluster” which is certainly scary enough to make you think a little bit more about your online privacy settings and what you’re sharing on the “love to hate it” social network.
“Access your digital shadow and see what we see” is the tag line for Digital Shadow. Read more now.
The United States has successfully resisted chip and pin technology for nearly a decade, and we’ve got the data breaches to prove it. Find out why transitioning away from cards with magnetic strips could be a lengthy process, even though better credit card security is long overdue.
The Department of Justice recently released a report on identity theft victims for 2012 entitled Victims of Identity Theft. In just one year, 7% of the population — that’s more than 16 million U.S. residents age 16 or older — were victims of identity theft. Losses from identity theft came to an astounding $24.7 billion.
Consumers love their tablets. Their big touch screens and extreme portability make them ideal for browsing, apps, email, and a host of other online activities. So it’s not surprising that over half of users say tablets are their favorite device, according to Adobe data.
Unfortunately, tablets are also the favorite device of identity thieves, who love to hack them.