Skip to main content

Useful ways to increase data security

Cybersecurity is on the rise, and as it is progressing at a huge speed, improvements in technologies are becoming better for both protecting our data, and for hackers and cyber-criminals to exploit it as well. For business organizations, this means a constant increasing in threats of cyber attacks towards them. Increased security measures are not just a for protecting data, but for protecting the infrastructure of the business as well.

Share this post

Comments ()

Cultural differences in data security

The differences on what counts as private information are varying, depending on which country we are talking about. In the EU, for example, an address, an e-mail address or a phone number already counts as sensible information, and companies can only use it if you agree to the terms. However, the social security number is not that highly protected, meanwhile, in the USA that code is the most valid link to your personal life. This is a huge difference: While in the EU a hacker cannot do much with a single social security number, in the US they can even apply for a loan or steal your whole identity.

Share this post

Comments ()

Facebook and Cambridge Analytica – the road so far

In our latest articles we broadened out topics by introducing some of the most burning issues that are concerning online media about safety and security on social media, and this time we would like to add our own thoughts of the Facebook link to Cambridge Analytica scandal so far.

Share this post

Comments ()

The General Data Protection Regulation

According to the official statement, The General Data Protection Regulation (GDPR) is a regulation by which the European Parliament, the Council of the European Union, and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). GDPR requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states.

Share this post

Comments ()

The basics of credit card hacking

As nowadays fund transfers and online shopping are taking up a huge majority of our finances, the number of related of frauds are on the rise as well. Today we dive into the topic of credit card hacking. We will discuss vulnerabilities in credit and debit card functionality that can help hackers steal data.

Share this post

Comments ()

How e-mail hacking works?

E-mail hacking is on the rise for companies, and this is not a surprise. As businesses go digital, e-mail data is becoming more valuable for hackers. SMEs and big corporations are being attacked as well, and the impacts can be very serious in every case. There are however reliable ways to prevent email hacking and reduce their impact.

Share this post

Comments ()

How social engineering can be a security issue

Strong passwords, two-factor authentications, using different accounts: the basics of IT security might sound familiar to you. We have also been writing articles on the issues, but we have jet not covered a very important risk in IT security, namely social engineering. Let’s look into it, and discuss how we can fight it to protect ourselves.

Share this post

Comments ()

How bad is it to use open WIFI networks?

When the topic of using open WIFI networks comes up, the majority of the people do not mind it, however, there is that small group of professionals who would never want to use the service, and would rather just rely on their mobile internet. But how bad is the situation really? There are rumors and facts out in the public about hacking free WIFI systems and monitoring users’ activities, but how common is that present? In today’s article, we will dig a little deeper in the topic to see if there is something to fear about them in our everyday lives.

Share this post

Comments ()

Ethical hackers: how they help us

From the word “hacker” lot of people think of dark, wicked men sitting in server rooms, surrounded by high capacity computers, doing bad. Many do not know that this definition is most likely to fit crackers, who are the ones that violate systems and break into networks with malicious intent. Hackers, on the other hand, are trying to enter systems to find dangerous holes in them and share their knowledge so that those threats can be eliminated. But as the terminology is mostly mixed up nowadays, we usually use “ethical hacker” for the good guys and hackers/crackers for the bad ones.

Share this post

Comments ()

How cell phone hacking can affect you?

Cell phones, connected to e-mail and social media accounts are a sensitive area and have a major risk of being hacked. Our cell phones have access to our Dropbox, Gmail, Facebook, Twitter, Instagram accounts, and in most cases to our banking information. A hacked cell phone makes blackmailing, identity theft and losing money a great threat for the owner of the device. With some social engineering, a telephone number and some basic IT knowledge, it is an easy job to hack one’s phone. A trustworthy but otherwise fake site that is convincingly copying a service you use is enough to get the sensitive information they need for a successful hacking.

Share this post

Comments ()