EZPD Blog Posts
-
The Global Reaction to the ‘Paris Call for Trust and Security in Cyberspace’
Earlier this month, leaders gathered in Paris for the hundredth anniversary of the end of World War One. French President Emmanuel Macron took this time of gathering (as it also overlapped with the UNESCO Internet Governance Forum) to introduce a new initiative he’s been working on called the “Paris call for trust and security in…
-
How to Check if your Facebook Account was Hacked
What to do to Protect Yourself Now, and in the Future? Roughly one month ago, social media giant Facebook, announced a breach that may have impacted up to 50 million of their users. The company believes that attackers used the Facebook developer APIs to obtain user information commonly found in bios, like: The New York…
-
How to protect your cryptocurrency from theft
Since the dawn of cryptocurrency time, hackers and bad actors have found creative ways to steal or intercept cryptocurrency from its true owners. One of the most notable examples of this is the story of the now defunct bitcoin exchange company, Mt.Gox. The organization started in 2010 and quickly became one of the largest players…
-
4 ways to protect your family’s privacy online
In the modern day of cyber attacks and data breaches, it can be difficult for any one of us to maintain privacy online. Our most sensitive information ranging from family photos to intimate finance details are flowing onto the internet, and hackers and schemes are more sophisticated than ever. As if we don’t have enough…
-
What we Know About Global Password Security
Each year, LastPass conducts a survey that examines the state of global password security. In 2018, the company polled 43,000 businesses across the globe to check in on the health of organizations based on their password creation policies. The study considered the following: Each company polled was given a score on a scale of 0-100,…
-
SB 327 May Require Stronger Passwords on IoT Devices
You may recall in October 2016 when the Mirai botnet disrupted the internet. The DDoS attack made major Internet platforms and services unavailable to large swathes of users in Europe and North America. The botnet was able to have this control by taking advantage of connected devices that were protected by factory-default usernames and passwords…
Any questions?