by Omega | May 23, 2018 | Cyber Security, Data Breach, Data Security
On opening this piece, you’re probably thinking, “here’s one more article related to cyber crime and a few more tips on protecting your data.” Sometimes, the information overload on cyber security makes the process of securing data seem more complex...
by Omega | Dec 19, 2017 | Data Breach, Malware, Multiple factors of authentication
This holiday season, “Grinch Bots” — automated purchasing tools that scalp high-demand items in large quantities and list them on e-commerce marketplaces at inflated prices — are making quite a mark. To give you an idea of how inflated these...
by Omega | Oct 27, 2017 | Data Breach, Data Security, Risk Assessment
The latest results from the 2017 IBM and Ponemon Institute study on the cost of a data breach show a 10% decline globally but a 5% increase in the U.S. Why this is? On an average, it takes more than six months for a company to determine a breach. The quicker a breach...
by Omega | Oct 12, 2017 | Cyber Security, Data Breach, Data Security, Managed Security Service Provider, Multiple factors of authentication, New Technology, PCI DSS 3.2, Security Strategist, Wireless Security
The widespread breaches and natural disasters of 2017 have forced us to think deeply about how convenience stores can be more resilient to cyber threats. Equifax, Sonic Drive-In, U.S. Power Plants, Petya, WannaCry, Chipotle, Yahoo, Irma, Harvey, Maria — what do these...
by Omega | Oct 5, 2017 | Cyber Security, Data Breach, Data Security, Malware, Skimming
Do not use debit cards for any type of purchase. If the card is breached, the criminal has direct access to your checking account. It can be instantly cleaned out. Unlike credit cards where you can dispute a charge, there is no way to reclaim the money you lost. Do...
by Omega | Sep 22, 2017 | Cyber Security, Data Breach, Data Security, Multiple factors of authentication, New Technology, Online Cloud Security, Password Security, PCI DSS 3.2
Information security courses teach data security professionals to incorporate multiple layers of security to secure their systems. This is the right advice. A four foot fence might keep some criminals out, but an athlete would have no problem jumping the fence. The...