What can Cyber Criminals Do with Your Information?

What can Cyber Criminals Do with Your Information?   Identity Theft Identity theft is the act of forging somebody else’s identity by utilizing their social security number, credit card info, and other identifying factors to obtain benefits through the victim’s name and identification, typically at the expense of the victim. Each year, roughly 9 million […]

The Impact of COVID-19 on the Cyber Scene?

The Impact of COVID-19 on the Cyber Scene? With the rise of the COVID-19 pandemic in 2020, the world has been forced to move online — in the absence of real life interactions and activities, many have turned to the world wide web for entertainment and communication purposes. According to user telemetry statistics collected from […]

The Ultimate Guide To Understanding Phishing In 2020

Phishing Simulation

The Ultimate Guide To Understanding Phishing In 2020 Table of Contents: 1. Introduction  2. Types of Phishing Attacks 3. How to identify a Phishing Attack 4. How to protect your company      Introduction What is phishing? Phishing is a cybercrime that entices individuals to give out passwords or other information. With this information, attackers can […]

Cybersecurity 101: What You Need To Know!

Cybersecurity 101: What You Need To Know! [Table of Contents] What is cybersecurity? Why is cybersecurity important? How does cybersecurity affect me? Cybersecurity 101 – Topics Internet / Cloud / Network security IoT & Household Security Spam, Social Engineering & Phishing How to protect yourself online & offline   [Quick Glossary / Definitions]* Cybersecurity: “measures […]

33 Cybersecurity Stats for 2020

33 Cybersecurity Stats for 2020 Table of Contents The Importance of Cybersecurity 33 Cybersecurity Statistics for 2020 Big Takeaways   The Importance of Cybersecurity    Cybersecurity has become an increasingly bigger problem for large and small businesses alike. Although everyday we learn more about how to defend ourselves from these attacks, the industry still has […]

Back to Basics: Hardening Computers & Smartphones

Computer Security

Guest Post Author: z3roTrust Too often, I‘ve noticed that Information Security professionals write articles that target their own peers who already possess a high level of understanding of cybersecurity principles. That’s all fine and well if you’re writing a technical whitepaper or something, but I don’t believe that enough is being done to educate the […]