If you are not a big fan of long, unique passwords or perhaps are reluctant ever type passwords again, this is for you. I will show you a method that lets you do exactly what the cybersecurity experts have been instructing us to do for years: use long non-dictionary passwords … Read >
Author: Ari
10 cornerstones for managing cyber security
I recently read a book titled Cyber Crisis that has a mission to convince every business manager and a person who owns a phone, computer, game console or an electronics device that cybersecurity is everyone’s business. The author Eric Cole, an industry-recognized security expert, has written an easy to read … Read >
Cybersecurity trends for small businesses and homes for 2023
While small organizations and home computer users continually learn more about cybersecurity, information technology develops as well. Managers can adopt the latest tools to protect important business data within organizations and family heads can protect sensitive personal data at homes. Cybercriminals, however, have access to the same technologies as everyone … Read >
Mobile devices you need for staying online on the road
Planning what to pack on a trip can be a tricky task, and if your work involves computers and connectivity, it complicates the task even more. The length of a trip, is it a work or leisure journey, the packing space available, and expected time without ability to recharge gadgets … Read >
The problem with privacy: ideas and real life behavior don’t match
Scientists have researched for years the mismatch of results originating from interviews and surveys, and the actual behavior of people. Something tends to be wrong with the results, although respondents feel they have given accurate answers. This phenomenon is surprisingly evident with cyber related matters such as privacy and security.… Read >
What small businesses and homes can learn from the Twitter whistleblower
One of the last big decisions Jack Dorsey made before handing over Twitter’s CEO responsibilities to Parag Agrawal was to hire a cybersecurity expert to fix the numerous security problems the company has. Peiter “Mudge” Zatko accepted Dorsey’s offer, and took the job. After getting to know Twitter’s IT operations, … Read >
Have you misunderstood Linux?
Linux is an excellent piece of software, but what exactly is it? Your mobile phone may run Linux if it is powered by Android, the most powerful cloud servers on the internet are powered by Linux, your security camera may run on Linux and many personal computers are running Linux … Read >
Inside Facebook: what makes the Zuckerberg machine tick
Facebook is such a powerful global enterprise that its founder and CEO Mark Zuckerberg and other leaders haven’t always understood its might. The social media service has been exploited to rig elections, to develop terrorist and hate communities, and spread fake news, to name a few activities that have had … Read >
Privacy paradox and five more data related megatrends
Collecting internet users’ data for trading it for profit is such a big business that it is not going to die anytime soon, even though people and governments across the world are getting increasingly worried about this shady practice. EU’s GDPR and other initiatives that are being implemented are creating … Read >
The one and only cybersecurity rule for small businesses
If you haven’t been hacked yet, sooner or later you will be. This uncomfortable realization has been stuck in my head ever since I read Nicole Perlroth’s book This Is How They Tell Me the World Ends: The Cyberweapons Arms Race. The book describes the global trade of the … Read >