Keeping data backups offsite greatly reduces your ransomware risk
In the first instalment of this two-article series we will be looking at cybersecurity habits to avoid when using your computing devices
A week ago, a concerned Naked Security reader shared with us a “send us money or else” email that was a bit different from others he’d received in the past. The claims and the demands followed a predictable theme – one that we call sextortion because of the connection between sexuality and extortion. Simply...
IT Providers are considered high targets and we take this threat very seriously. If we are breached our clients will be the ones victimized.
Nearly half of all social media-related phishing emails imitated LinkedIn messages. This is a trend we are seeing each quarter, likely because there is a perception that these emails appear to be legitimately coming from a professional network.
Pitney Bowes was affected by a malware attack which impacted some systems & disrupted client access to some of our services. We apologize for any disruption to your systems. We are working to restore affected systems. Please visit http://pb.com/systemupdate for updates. (Source Twitter @PitneyBowes).
Only 30% knew that starting a URL with https:// means that the information sent to that site is encrypted.
We now have an option from Google to set search and location data to automatically disappear after a certain time. You should use this feature!