cyber security

/cyber security

How Social Media Undermines Your Organization’s Security

The best place to start for this entry is the opening months of the pandemic. We begin here because there was an inflection point in social media use mid-March 2020. As society-at-large was in lockdown trying to figure out what was happening, there was a nearly 25% increase in people using social media apps, according [...]

Privacy Policy Ideas and Other Privacy Matters

We run a monthly cybersecurity meet up and at our last meeting we focused on privacy policies. While they're not the most glamours things too look at, we wanted to share some privacy policy ideas and other privacy matters that popped up in the conversation. The first of which we’ll touch upon relates to consultants/contractors [...]

What Is a Cybersecurity Framework and What To Expect When Building It Out

Around July of 2021, we wrote about one of Connecticut’s new cybessecurity laws, which you can find here[Link]. Our disclaimer still stands that we aren’t lawyers, so if this law affects your organization, please consult with a knowledgeable attorney. While that post was a regurgitation of the law, we didn’t talk about cybersecurity frameworks themselves. [...]

How To Know if Stalkerware Is on a Device

A warning to anyone reading this in an abusive/toxic relationship If you’re reading this article, you’ve most likely searched for something like “how do i know if stalkerware is on my device” or something to that nature. Assume that your partner can see this. Before you decide to get rid of any stalkerware, make sure [...]

Yet Another Cybersecurity Prediction Article For 2022

As tradition in the InfoSec world dictates, it’s time for us to prognosticate what 2022 is going to look like with cyber attacks and other issues. Log4j As of right now, Log4j will be the gift that keeps on giving. To catch up on Log4j/log4shell stuff, check out our article that we’ve been updating. Because [...]

Log4j and Log4shell Updates

This article, while hastily written, will be as brief as possible with regard to log4j /log4shell. We’ve been updating our newsletter subscribers about it shortly after it the Minecraft exploitation. To subscribe to the newsletter for cyber security and intelligence news, tips, tricks, and tool here’s the sign-up link Software vulnerabilities log4j: A logging [...]

Bsquared Intel’s Ultimate Holiday Shopping Cyber Security Guide

This article contains an affiliate link for ProtonVPN which we have an independent partnership with. Welcome to Bsquared Intel’s Ultimate Holiday Shopping Cyber Security Guide! If you are one of the 158 million people that the National Retailers Federation estimates will go shopping this Black Friday [Source: Yahoo! News] it’s a good time to keep [...]

8 Ways to Improve Your Privacy

Here are eight ways you can improve your privacy if you’re concerned about others snooping on your social media profiles, advertisers tracking you online, those going through your trash, those interested in your conversations or whereabouts, and protecting your files/devices. 1. Get your social media under control Limit the amount of information you share. We’ve [...]

3 Ways Cybersquatting Harms Your Business

Cybersquatting is defined as: “… registering, trafficking in, or using an Internet domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. The cybersquatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price.” [...]