TechGuard Blog


Social Engineering Takes on Many Shapes

Social Engineering takes on many forms including face to face, over the phone, in emails and through the mail. Some might refer to social engineering as scams or con-artists or think of famous movies like "Ocean's Eleven", but social engineering...

HTTPS: "Secure" Doesn't Always Mean "Secure"

Visualize yourself standing in the middle of a crowd shouting out your personally identifiable information, your credit/debit card number and your home address. No one would ever risk doing this, because odds are in that crowd stands an opportunist...

Cybersecurity ROI - Overcome These 5 Challenges Before Facing Your Board

Convince your board of directors you can show the Return on Investment (ROI) of engagement in cybersecurity services. It seems simple enough. Get to the point. Show how investing in loss prevention services like cybersecurity will save your company...

Create a Top-Down Security Culture

The philosophy of creating a top-down security-minded culture at work makes perfect sense. How many times have you heard the saying "practice what you preach"? Often I think of parents and school teachers creating this type of top-down culture to be...

Hackers and the Upcoming Election

After the 2016 Presidential Election, many have concerns over voting security. This midterm election will reveal whether the Republicans will remain dominant over the legislative branch or if the Democrats will reign power. There's no doubt that...

Lock Hackers Out of Your Company's Wi-Fi

Wi-Fi technologies have created a world in which we can stay connected almost any time and anywhere. In fact, around the globe Wi-Fi has changed people's attitudes about where, when and how we work. According to researchers, more than two-thirds of...

Insider Threats are Weakening Your Physical Security

Insider threats to a company's physical security are often thought of as malicious insiders. The reality is that most insider threats are a result of well-intended employees who lack awareness about security practices. It is important to work with a...

Catch Email Phishing Attacks Before they Catch You

The million-dollar question is: Could you catch email phishing attacks before they catch you? Yes, it's true. A successful phishing attack costs a mid-sized company an average of 1.6 million dollars. Having the ability to recognize the signs of a...

Password Check: Are Yours Up to Par?

Most people do not put a lot of consideration into the security of their passwords. People are often concerned with their ability to remember their password, rather than the security they create. Yet, many know the risks of weak passwords and the...

Phone Fraud Taken to a New Level

Beware! There's a new level of phone fraud taking place. What would you do if you showed up for work and by 9:30 a.m. your cell phone rang between 100-150 times? Many go to voicemail but you answer some of the calls in an attempt to determine what is...

Geo-Tracking Employees: Worth the Risk?

Depending on which perspective you are viewing from, might determine whether you support the idea of geo-tracking employees' locations. Controversy over whether this type of tracking arises when considering privacy rights. If employers can video...

How to Respond to a Breach within your Company

Every day we hear of another breach and as they continue to pop up, we become less surprised. Information travels quickly. For example, consider how many stories of breached data you've heard of in the news lately. Most will remember some of the...

 


 

Read More Articles →