1-877-878-7810

Information Security Resources

Expert articles
5 Simple Rules for Storing Your Credit Card Information

5 Simple Rules for Storing Your Credit Card Information

Storing credit card information can be a daunting task, but there are a few simple rules you can follow to make sure your data is safe. #1 Never store your credit card information on a public computer or in an unsecured location. If you must keep your credit card...

read more
Novel Phishing Trick: Unusual Links to Trick Spam Filters

Novel Phishing Trick: Unusual Links to Trick Spam Filters

Researchers have identified a never-before-seen method for sneaking malicious links into email inboxes. A novel form of phishing takes advantage of a disparity between how browsers and email inboxes read web domains. According to a Monday report by Perception Point,...

read more
World Password Day 2022: All You Want to Know

World Password Day 2022: All You Want to Know

One of the most fun and effective ways to spread public awareness about a topic or issue is to commemorate it by devoting a specific day in its honor. With the help of powerful social media forums and passionate advocates, everything from puppies to pirates can be...

read more
TSA Requires Rail and Airports to Strengthen Cybersecurity

TSA Requires Rail and Airports to Strengthen Cybersecurity

Earlier this year, a ransomware attack on the Colonial pipeline severely interrupted the country’s fuel distribution system. In response, regulations were implemented in May that strengthened the cybersecurity infrastructure of the pipeline system. In light of this...

read more
Data Breach Kicks U.S. Dental Patients in the Teeth

Data Breach Kicks U.S. Dental Patients in the Teeth

North American Dental Management is a company based in Pittsburgh responsible for providing administrative and technical support services to Professional Dental Alliance offices. On March 31st and April 1st of 2021, an unauthorized entity gained access to the...

read more
T-Mobile: 49 Million Customers Hit by Data Breach

T-Mobile: 49 Million Customers Hit by Data Breach

In the era when smartphones have become indispensable in so many aspects of life, data breaches can be more devastating than ever before. The recent T-Mobile attack is a perfect example of such breaches. Here is what we know about the incident: The first and last...

read more
Importance of Information Security Policies

Importance of Information Security Policies

The importance of information security cannot be overstated. Protecting the data your business stores, manages, or transmits should be one of your company’s most important priorities. To that end, you need to implement an information security program that includes a...

read more
Data Retention Policy Best Practices

Data Retention Policy Best Practices

Data is the lifeblood of countless organizations. Whether you focus on healthcare, hospitality, tax processing, communications, education, or retail, the security and privacy of the information you store, manage, and transmit is of paramount importance. However, the...

read more
Data Security Strategy

Data Security Strategy

When you are on the front lines charged with the critical duty of ensuring that your company’s information and systems are as protected as possible from risk, your data security strategy needs to be complex and multi-layered. Threats can come in numerous forms:...

read more