MicrosoftTeams image 1

Online Safety For Children

by Marisa Sgambati | June 8, 2022 | Cyber Risk, Cybersecurity, Data & Cybersecurity, Data Protection

Technology is all around us. Smartphones, smart watches, cars, computers, refrigerators, and cameras have become an enormous part of our everyday lives. These introductions have challenged us to constantly adapt. We are living in (and raising families in) an evolving technological society. As a p ....

How To Avoid Ukraine Related Scams

How To Avoid Ukraine-Related Scams

by Eric Krell | March 15, 2022 | Cybersecurity, Data & Cybersecurity

A mid-March search for Ukraine scams on the Better Business Bureau’s (BBB’s) scam-tracking site yielded more than 100 reports of bad actors attempting to exploit the crisis by running fake donation campaigns in the U.S. and Canada. “The current situation is near and dear to many hearts, par ....

Tis the Season for Scamming Protect Yourself and Your Customers

‘Tis the Season for Scamming: Protect Yourself and Your Customers

by Nasser Fattah | December 13, 2021 | Cybersecurity

It should be the season of good cheer, but the rise in shopping this time of year brings with it a rise in scams. It’s harder to be cheerful when you realize that great deal you thought you were so lucky to find was actually just a ploy to get your credit card information. Continue reading for bes ....

Blockchain TPRM Implications

Blockchain TPRM Implications

by Tom Fuhrman, Marya Roddis, Charlie Miller | December 2, 2021 | Cybersecurity, Operational Risk, Risk Compliance

As an industry, government, and technology partners work to identify the key elements required to make blockchain mainstream (sovereign identity agreements, improved safety, and related regulations, interoperability and functionality, open and transparent commercial availability), the time to focus ....

Untitled 10

5 Drivers of IoT Risks

by Eric Krell | October 29, 2021 | Cybersecurity, Internet of Things (IoT)

In 1969, two programmers took a step that ultimately generated bigger leaps for humankind than the moon landing. On Oct. 29, 1969, a coder in Los Angeles transmitted via a basic computer network a briefer than expected digital message to his partner at the Stanford Research Institute in Menlo Par ....

Untitled 15

Workplace Safety, Security, and Data Governance

by John Bree, Alpa Inamdar | October 2, 2021 | Cybersecurity, Data & Cybersecurity, Data Protection

As I walk across the lobby after my commute to the city and use my ID card to activate the turnstile, I wave to the security team and head to the elevator. Arriving on my team floor, I once again use my ID card to enter the office. “Good morning, Sowmya.” “Hey, Jimmy.” “Hola, Soni ....

Next Page »