Privacy Tag - Page 5 of 7 - Hackensack, NJ | Net It On

    blog-img

    Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing history.

    Read More
    blog-img

    If you made use of Acer’s online store to purchase a device between May 12, of 2015 and April 28, 2016, we have some bad news for you: There’s a chance you received a letter from Acer to inform you that your card’s credentials were stolen.

    Read More
    blog-img

    Due to recent legislative activity, the rules and regulations that the Federal Communications Commission put in place to protect the personal data of Internet users have been struck down. This change now allows ISPs, or Internet Service Providers, to sell the browsing information of their customers to advertisers without consent--a move many consider to be a threat to net neutrality. This is what you need to know.

    Read More
    blog-img

    It’s a tough lesson to learn, but almost any company is susceptible to cyber-attacks that take advantage of any security setup’s weakest link: the people involved. This lesson was most recently learned the hard way by two unnamed tech companies that fell victim to a phishing campaign that was allegedly run by Evaldas Rimasauskas, a Lithuanian man accused of stealing $100 million from them.

    Read More
    blog-img

    One of the biggest fears of every smartphone user is having their phone stolen. Compounding this fear is the additional risk of the thief accessing the contents of the device and doing with it as they please. To help reduce the injury that comes from the insult of a stolen phone, security developers have come up with several clever solutions.

    Read More
    blog-img

    Did you know that many webcams are infested with RATs? Not unlike their furry counterparts, RATs (or Remote Access Tools) are a nuisance that can cross the line into hazardous. This form of software allows a non-user to spy on a computer, giving them the ability to steal information or even record you and your environment with a PC’s webcam.

    Read More
    blog-img

    One major advantage of the cloud is that it allows users to easily share files. Although, due to just how easy it is to share files, this advantage may also prove to be a disadvantage, especially when inexperienced users are the ones doing the sharing. The next time your business shares a file with a cloud-based file sharing service, be sure to account for these three risks.

    Read More
    blog-img

    Data security is arguably one of the most important parts of running a business, especially when personally identifiable or confidential information is being shared across your network. Yet, some businesses continue to ignore security in favor of a “more convenient” approach which doesn’t hinder operations. When implemented properly, your security not only augments operations, but secures your organization’s data infrastructure.

    Read More
    blog-img

    Social Media allows businesses to share their brand with the outside world in entirely new ways. While the benefit of social media is that everyone and their mother is on it, the problem with social media is that everyone and their mother is on it. People put all sorts of information on their accounts, which translates into a major security risk in the form of targeted phishing attacks.

    Read More
    blog-img

    Healthcare organizations are a hot topic when it comes to cybersecurity, as even a small data breach could turn into a goldmine for hackers. Recently, IBM’s 2016 Cyber Security Intelligence Index has reported a data breach that exposed more than 10 million medical records, which shows us just how scary a breach of this kind can be. The secret weapon, in many cases, is a threat called ransomware.

    Read More