How to select service providers that keep your data safe

It often happens that we share our personal information with all kinds of companies and institutions. And we do so all the time, when we open a bank account, when we set up a fidelity card and so on.   But it doesn’t mean that all these organizations know how to keep our data safe. […]

Track your web traffic on a global map

Have you ever tried to image how your Internet traffic looks like? Do you know where do your request goes when you access a website? You’re in for a big surprise! Use this tool to track your web traffic around the world and see how complicated the journey can be: http://www.monitis.com/traceroute/ This all happens in […]

How to stop Google from tracking you and your kids

Privacy and security are very closely related. You just can’t have one without the other.   And when it comes to the ones we love, there’s nothing we wouldn’t do to protect them.   This guide will show you how to: Block trackers Turn off interest-based ads in Google Use alternative search.   All so […]

Why cyber attackers are stealing healthcare records

It’s almost impossible to avoid the news about data leaks from the healthcare industry. There are so many data breaches that people have almost gotten used to them.   “Since late 2009, the medical information of more than 155 million Americans has been exposed without their permission through about 1,500 breaches.”   But this matter […]

You can’t lose what you don’t have

We love learning from cyber security experts and we hope you do too.   Today’s Daily Security Tip comes from Troy Hunt, Microsoft MVP for Developer Security: “Think twice before creating anything digital you wouldn’t want exposed including malicious email and nudie pics.”   The same goes for online accounts and sharing your data on the web. If you spread […]

Steer clear of public wi-fi

You discover a wonderful new coffee shop. The mug sits in front of you, surrounded in this wonderful light. You grab your mobile and decide to post a photo of it on Instagram. Or Snapchat – whatever works for you, we don’t judge. But first, you connect to a random wi-fi.   Ok, hold it […]

How safe official mobile app stores really are

I’m sure you’ve already heard how important it is not to install third-party apps on your mobile phone. You’ve been warned that apps that aren’t in the official app store are a security threat. But did you know that 75% of the apps in the public app stores do not pass basic security checks? (source) […]

Major sports events attract major cyber security threats

Major sports events are a wonderful opportunity for scammers. You might not usually use sports apps or websites, but you become an active sports fan during major events, such as Euro or the Olympic Games. Cyber attackers use the hype to lure you with phishing emails and fake websites, exposing sports fans to new cyber […]

Sluggish PC? Might be sign of a malware infection

Is your computer running slower than usual? Does it take longer to start some of your programs? Malware has the tendency of slowing down your operating system, your apps or internet speed. If you notice anything like this and you’re not using any resource-heavy apps, check first for other causes. It may be that your […]

Watch out for vengeful ex-employees

Here’s an alarming statistic: almost two thirds of employees steal proprietary corporate data when they quit or are fired. If one of your soon-to-be-ex colleagues decides to do some damage before they leave the company, make sure that your work remains unaffected. Have a checklist of all the accounts that they had access to. Don’t […]

How to stay safe on public wireless networks

We already talked about why you shouldn’t connect to public wireless networks and the security risks you expose yourself to. However, if it’s inevitable, here’s how to make sure that your connection is somewhat secure: Check the type of encryption it’s using. See if the connection is secured using WPA security (WPA2 is even better), instead […]

How not to infect your mobile phone with malicious apps

1. Only install well-known apps, ones that are extremely popular, from big companies. Odds are that they have an army of developers behind them and will make fewer mistakes than the small apps from less experienced creators. 2. Do a clean-up among the apps already installed. Get rid of the ones that you don’t use […]

The list of shameful passwords

No matter how uninspired you are, never ever, under any circumstances, set one of the following passwords for your account:   Any variation of the word “password” or “admin”. Your name or surname. Your partner’s name or surname. Name or surname of any member of your family. The dog counts as your family. Birthdate or […]

Out-of-Office auto-responder? Don’t reveal too much

We’ve been writing a lot about why you shouldn’t tip criminals on your whereabouts. Don’t check in on social networks when you’re on holidays, no matter how beautiful the landscape is. Your frenemies will still be envy if you post those photos after you get back home. Don’t write on your blog bragging about the […]

Use a separate card for shopping online

The easiest way not to worry about shopping online: have a separate credit card that you only use for that activity. Transfer money on it every time you plan on buying something. Otherwise, leave it almost empty, only with enough funds for bank’s commissions. This way, in case someone manages to breach one of your […]

Find out what Google knows about you

Time to explore what Google knows about you from your searches, Youtube history, Chrome browsing, Android usage, Waze navigation and other Google services you’re using. To do that, use the new “My Activity” tool: https://myactivity.google.com/ In Google’s own words: “Data helps make Google services more useful for you. Sign in to review and manage your […]

Why we’re dealing with today’s cyber security challenges

I found this great video that explains how the Internet became so complex and why cyber crime emerged in the first place. You’ll get a much better understanding of how this entire cyber crime world started and evolved. I promise these 4 minutes will be well spent: https://www.youtube.com/watch?v=sdpxddDzXfE

data monitoring

Pros and Cons of Employee Monitoring

Employee Monitoring + User Behavior Analysis + Data Leak Prevention Vs User Privacy + Trust + Productivity Goal Implement an employee monitoring solution that gives higher RoI, employees understand & like. Also employer needs to ascertain how to design a reasonable one. Questions Is it ok for employer to capture personal information and data of […]

panzer dlp

What is DLP?

Data Leak Prevention is a specialized software, which protects organization against data loss. This technology grants both blocking of confidential information transfer through various data channels and monitoring employee activity. Therefore it allows to find vulnerabilities beforehand. Why does company need DLP and how does the solution work? Companies often pay more attention to external […]