“Alexa, what’s the weather?” “Hey Siri, preheat the oven to 350 degrees.” A simple spoken command is all it takes for many people to obtain information or interact with their appliances today. Similarly, in the not-too-distant future, instead of asking for directions...

‘Tis the Season for Holiday Scams
Busy and distracted online shoppers are prime targets for cyber scams. This season’s stressors include supply chain issues and shipping delays along with low stock and rising prices fueled by increased consumer demand. Predictably, cyber criminals will capitalize on...
The Rise of Synthetic Content and Deepfakes
What is Synthetic Content? The Federal Bureau of Investigation defines synthetic content as a broad spectrum of generated or manipulated digital content that includes images, video, audio, and text. In other words, it is content that has been automatically created....
Do smart devices mean smart security?
The IoT (Internet of Things) is a system of interrelated computing devices and objects that transfer data over a network without requiring human-to-human or human-to-computer interaction. The devices are connected to the internet that share data with other devices and...
October is Cybersecurity Awareness Month
This year marks the 18th year of observing cybersecurity awareness month – and initiative co-led by the United States Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCSA). The goal is to build awareness about the...
The Dangers of Data Scraping
What is data scraping? Data scraping is the process of extracting data from a website using automated tools and importing the information to another program/computer. This technique is used to collect vast amount of publicly available information and reuse it...
What are ransomware attacks
Ransomware is a form of malware that encrypts files on a device that compromises a system. Malicious actors rely on it for extorting money from individuals or organizations. Typically, hackers first deny access of files to users by encrypting the data. They hold...
Rethinking Password Security
Passwords provide the first line of defense when a user wishes to gain access to a device or platform. It is the most used method of security. The stronger your password, the more protected your computer will be from hackers and malicious software. Creating Secure...
SolarWinds: Supply Chain Attack, Concerns, and Remediation Whitepaper Available
The compromise of the SolarWinds Orion Network Configuration Manager Update has been in the news since its discovery in December 2020. The impact of this cyberattack on a software supply chain (attacking a vendor’s software update build) is quite extensive and poses a...
Security First: Why you should think twice before allowing browser notifications
You may have noticed that while browsing the web, a prompt appears on the top of your screen that asks your permission to allow or block notifications from the site. These browser notifications or “push notifications” often appear on a mobile or desktop device when a...