EZPD Blog Posts
-
How to Properly Define a Hacker
When you think of a hacker, the stereotypical image is often a male operating mysteriously in a darkened room. Technically, a hacker is a skilled computer expert who leverages their technical knowledge to overcome a problem. But, the more common definition is actually about a security hacker, or when someone uses their technical knowledge to deploy bugs…
-
Using Your Smartphone as a Mobile Hotspot, is it Secure?
For anywhere between $5 to $20 per month, depending on the provider, you can turn any park, coffee shop, beach, or bar into your office. All you need is a laptop and a smartphone with a tethering option. While many of us may consider this accessibility utopian, it can also be a surprising recipe for…
-
How AI is Shaping Cybersecurity’s Future (and What that Means for You)
In 2017 there were 1,579 data breaches, according to a dossier by Statista, a leading aggregator of market and consumer data. The breaches exposed consumers’ sensitive information—from medical information to account numbers—representing roughly 179 million individual records being vulnerable to criminal misuse. That’s eye-opening in and of itself, but when you consider that just five…
-
Two Breaches That Remind Us of the Importance of Password Protection
By now, most of us realize the importance of having a password, right? Not so fast. As it turns out, two recent data breaches could have been prevented if two notable organizations would have used a password—preferably a strong one—but in these instances, any password would have helped. The Weight Watchers Breach Earlier this week, dozens…
-
Five File Sharing Habits You Need to Break Immediately
In today’s hyperconnected world, digital collaboration and communication is not an option, but rather a requirement. We all need quick, easy and safe methods for sharing digital information. However, there are right and wrong ways to file share. From sharing important information with clients and employees to transferring sensitive information to professionals we trust, paying…
-
What You Need to Know About Joanap, Our Latest Security Concern
This week, FBI officials sent out a warning about the password-stealing malware, Joanap. According to The Department of Homeland Security and the FBI, North Korean hackers have been using: Officially, the U.S. Government has been referring to malicious cyber activity by the North Korean government as HIDDEN COBRA. It is believed by the government that…
Any questions?