What in the World is a Deepfake?
Mark was having a typical workday when he played his voicemails back. One of them was from his boss Tom, who was on vacation and
Mark was having a typical workday when he played his voicemails back. One of them was from his boss Tom, who was on vacation and
Beware! That email from your bank, credit card, or social security can be a door to nasty malware, system hijacking, or a data breach. Fraudulent
When it comes to passwords, small-to-medium-sized businesses and organizations should remember a few things to make them more secure. But passwords should not be the
(This is the second of two articles on personally identifiable information (PII).) Data privacy is not only a personal data issue. Not only is PII
(This is the first of two articles on personally identifiable information(PII).) Steve had just received his credit report and noticed a bank loan taken out
Larry had been working in the accounting department of a medium-sized business for about a year and now had to hold down the fort while
Many daily data and system breaches around the world result from stolen, weak or reused passwords. Users need a password for almost every site and
Creating strong, complex passwords requires using the right kinds of characters, numbers and symbols. You should adhere to these practices even if you aren’t required
While the last two blogs were on password composition and practices for users, this one will focus on password policies for administrators and businesses. Keep
While using the recommendations in the first three blogs in this series (password composition, password practices, password policies) are critical, employers have to create a