The world we live in today is a tumultuous place. If the past two years have taught us nothing else, it has provided invaluable lessons on the ability to adapt and overcome. When the coronavirus pandemic traveled quickly throughout the globe, every business in every industry scrambled to find new ways to serve their customersContinue reading “Know When to Pivot”
Author Archives: Teri Wesley
Data Privacy: What It is and Why Should You Care About It
We live in a world where technology is constantly evolving and new ways to collect and use data are being developed every day. It can be hard to keep up with all the changes and understand what they mean for your privacy. This post will explain what data privacy is and why it’s important. You’llContinue reading “Data Privacy: What It is and Why Should You Care About It”
You Better Watch Out!
Dr. Seuss’ The Grinch is a holiday favorite this time of year. Just as that green grump disguises himself as Santa Claus to steal Christmas from his neighbors in Whoville, malicious cyber actors leverage the holiday spirit to stealthily target networks and systems belonging to organizations, businesses, and critical infrastructure. The Cybersecurity and Infrastructure SecurityContinue reading “You Better Watch Out!”
Be Cyber Smart. Are You Doing Your Part?
October crept up on us as hot summer nights quickly turned to cool, crisp evenings and green leaves have begun transitioning to yellows and reds in preparation for the annual autumn spectacular. Children across the country are deciding which favorite Superhero or villain they want to be when they participate in the annual tradition ofContinue reading “Be Cyber Smart. Are You Doing Your Part?”
Beware the Lure of Data Phishers! Don’t take the bait.
It’s that time of year when anglers take to the waters and cast their lines in hopes of hooking bass, salmon, and other savory fish. While spring and fall are peak times for sport fishing, there’s a different kind of “phishing” that’s always in season. Phishing is when someone uses fake emails or texts (evenContinue reading “Beware the Lure of Data Phishers! Don’t take the bait.”
Fight For Your Right to Data Privacy
Data privacy is a fundamental right. When you engage in online activity or share your data with a company who has requested it to provide products or services, you have the right to trust that your personal data will be handled with care and safeguarded against misuse. At the very least, you should have the right to be informed when your personal data will be, is being, or has been, collected and shared.
Safeguarding Your Children’s Privacy
Facebook’s recent announcement that it plans to launch an Instagram for Kids under the age of 13 has put children’s privacy in the headlines and in the forefront of parents’ minds. In 2017, Facebook – who owns Instagram – launched Messenger Kids for children between the ages of 6 and 12. At that time aContinue reading “Safeguarding Your Children’s Privacy”
Digital Spring Cleaning
The days are getting longer and the nights shorter. Daffodils are blooming and birds are chirping. Spring is in the air! Cracking open the windows to let the warm breeze in, it’s also the time of year when many homeowners participate in the annual rite of passage known as spring cleaning. As you dust andContinue reading “Digital Spring Cleaning”
5 Steps to Secure Your Mobile Device
Instead of being chained to a desk and PC (or Mac) or even a laptop, people are increasingly connecting for work, play, and entertainment “on the go” via smartphones and other mobile devices. According to Pew Research, nearly all Americans (97%) own a cellphone of some type, and 85% own smartphones. The number of smartphone users worldwide isContinue reading “5 Steps to Secure Your Mobile Device”
Operation Data Privacy Defense
From the time you joined the U.S. armed forces and solemnly swore to support and defend the Constitution of the United States against all enemies, foreign and domestic, the military has prepared you to fulfill that mission. You are armed with the training, knowledge, skills, and weapons to launch an effective defense against enemy forces.Continue reading “Operation Data Privacy Defense”