Public Wi-Fi presents a huge danger to those who access it. While it may be convenient and comfortable to check your email at your favorite coffee shop, many public Wi-Fi hotspots lack security.
We hear about them often: data breaches. They happen to Yahoo, Target, Uber, eBay, JP Mogan & Chase, Equifax...the list can go on for pages. But what is a data breach? And how can we protect ourselves and our valuable personal data?
It’s well-known that phishing attacks are a huge threat to all online accounts, both business and personal. To review, here are a few disturbing facts:
One lucky winner and more prizes to come!
Last fall, we brought The Judge Our HyperFIDO™ Campaign to university students across North America to introduce our HyperFIDO U2F Security Keys and to increase security awareness. With the campaign coming to a close, we’ve started to give out some of the fantastic prizes to participating students.
Check out our latest winner, who snagged a $100 gift certificate to ThinkGeek.com!
An Introduction for Educators and Administrators
Two-factor authentication (2FA) is a pretty simple concept; it boils down to “something you have” and “something you know.” But how can it used to protect student information, uphold educator integrity, and ensure administrators maintain a strong, trustworthy relationship with parents?
Is it too good to be true?
For some people, protecting online accounts is looked upon as more of a hassle than anything else. Whether it’s the “it won’t happen to me; I have nothing worth hacking” or the “it’s more trouble than it’s worth” line of thought, people sometimes use secure authentication only as a last resort. When they do decide to use it, they often choose what seems to be the simplest and most readily available of methods: SMS, or text messages, an emailed security code, or an authentication app. What happens next? They quickly learn what a pain it can be to sign in to their newly protected accounts from their mobile devices.
A Simple Way to Secure Teacher Access
More and more schools are switching to a centralized student record system. It’s no wonder, considering that well-managed student data can make reporting and transfers easier, as well as provide education professionals with tools for collaboration and planning. There is a downside, however: with a centralized system, all that’s keeping a hacker from gaining access to report cards, test scores, student addresses and a host of other confidential information is a static username and password. And the thing is? These hacks aren’t always by some stranger in the dark. It might be one of their own students.
What can be done to prevent scams
The IRS has reported a significant increase in fraudulent tax returns, totaling $63 billion in bogus claims between 2011 and 2014. Fraudulent tax returns are quickly becoming everyone’s problem: Not only are the victims left waiting for months to years for their legitimate refund, the extra funds going out of government coffers means other programs and government initiatives may fall by the wayside.
Congratulations to our lucky winner, James Curry, who has won a $50 gift certificate to Amazon.com
| Image of James Curry
Thanks to everyone who participated in our contest and helped make it a success! The new names have been announced here.
Stay tuned for our next contest and maybe you'll be our next winner!
This year we saw something new at RSA® Conference USA
For 25 years, RSA Conference has been held with the intention of informing people and helping them discover new technologies to stay ahead of cyberthreats. With almost 30,000 attendees annually, there are always new products, concepts and ideas being presented. Last year marked the introduction of the FIDO Ready™ products and the start of this game-changing initiative.
How to make sure you don't fall into the trap
As I was leaving work the other day, I got a text from a friend with the image below and this message: “This is on my screen???? Do I call the #? Help?!” Unfortunately, I didn't get the message in time to stop my friend from calling the phone number and giving her attacker all the information he needed to take control of her computer and steal her information, among other things.