Blog

/Blog/

8 Ways to Improve Your Privacy

Here are eight ways you can improve your privacy if you’re concerned about others snooping on your social media profiles, advertisers tracking you online, those going through your trash, those interested in your conversations or whereabouts, and protecting your files/devices. 1. Get your social media under control Limit the amount of information you share. We’ve [...]

3 Ways Cybersquatting Harms Your Business

Cybersquatting is defined as: “… registering, trafficking in, or using an Internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. The cybersquatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price.” [...]

Connecticut Public Act No. 21-119: Cyber Security Standards for Businesses

Hello everyone and thanks for stopping by. We wanted to take a quick minute to highlight what Connecticut Governor Ned Lamont recently signed into the law other day.  Before we dive in, an obligatory disclaimer.  We are not lawyers.  This post is not considered legal advice or a legal opinion.  We urge you to consult [...]

Why ransomware attacks keep happening

Based on reporting and our own observations, here are some reasons why ransomware isn't letting up any time soon: Cyber liability insurance policies with ransomware/extortion policies in them have incentivised attackers. The bad actors know that if their victim organization has a cyber extortion policy, they'll be paid. Some industries, like healthcare, may end up [...]

How does an unauthorized user gain access?

To start, an unauthorized user is someone who doesn't have permission to access a computer or a system. Unauthorized access is bypassing security policies and controls to said computer or system. Here are a few ways this happens: In Verizon's 2021 Data Breach Investigations Report, the FBI's 2020 Internet Crime Report, and EUROPOL's Internet Organized [...]

Project Warwalk: Warmarketing, Big Data, and Surveillance

Hello friend. For those following this series, welcome back! For the newcomers, you can catch up here for the Project Warwalk articles and the glossary. Today we’ll be talking about something we’re calling Warmarketing, which we’ll define below, as well as big data, and surveillance issues with regard to wireless devices and IoT. When we [...]