Strong Authentication and Regular Compliance Assessment Is Core to Fighting Cyber Crime
Companies can look at setting up special advisory committee or crisis management team comprising of executive and board members aligned with the Information Technology Amendment Act, 2008
TikTok Accused of Putting Children at Risk (Again)
The popular app has allegedly violated an agreement with the FTC to protect underage users.
Cybersecurity Tips to Prevent Remote Workers from Compromising Company Data During Covid-19
These are unprecedented times in which both companies, people, businesses, and governments are still navigating their way around this Covid-19 pandemic. But it is through these times of chaos that criminals exploit those who drop the guard.
Employees Are Your Weakest Link Against Cyberattacks. Don't Put Them on the Front Lines
It is the responsibility of businesses to create cybersecurity cultures that keep employees informed of risks and teach them strategies to stay one step ahead of hackers, but that consciously avoid placing employees at the center of prevention itself.
Your Identity Could Be Used in Online Dating Scams. Here's How to Protect Yourself.
Be aware of the most prevalent and predatory fraud schemes being carried out on online dating sites.
Here Come the 'Star Wars' Scams: Don't Fall for Them
Cybercriminals are using 'Star Wars: The Rise of Skywalker' as bait by creating fake websites that claim to offer free access to the film. But in reality, the websites try to trick you into handing over your credit card information.
Data Security in the Age of Online Payments and Social Media Validation: Where Does the Buck Stop?
In the light of the now infamous Tumblr adult content ban episode, the risk of compromise and misuse of digital media becomes all the more important
Eliminating Cyber Threats in 2020: Why Enterprises Need to Rethink Cyber security
Artificial Intelligence (AI)-powered solutions are a cost-effective way to deal with threats that reside on mobile devices, web servers, etc and proliferate from a number of sources
Top 3 Cyber Threats Prevalent Globally and How To Combat Them
Through monitoring, software professionals can verify security and compliance requirements regardless of whether data is stored locally, in a database, in a virtual environment or in the cloud
Survey: More Than 8 in 10 Fell Victim to Phishing Attacks in 2018. Here's What to Know About the Practice. (Infographic)
Phishing and other social engineering attacks cost victims more than $1.4 million in 2018, according to an Accenture study.
After More Than $700,000 Disappeared, They Launched the World's First Embezzlement Insurance
These entrepreneurs invented a product to protect business owners from the next Bernie Madoff -- or any other crooked financial advisor.