Protecting Personal Data

Cyber criminals don’t take a day off and neither should consumers when it comes to keeping your devices and your personal information safe. That’s the advice from North Texas cybersecurity expert Michael Moore, founder and CEO of M3 Networks.

"The most important thing to know about cybersecurity is that the attacks come from the inside, out," Moore said.

What does that mean exactly? Moore said many times we are the ones to blame for our own cybersecurity misfortune. Consumers are generally the ones who make it easy for cybercriminals to strike. Lack of training is a big part of that.

"Employees that haven’t been trained well on Ransomware. Somebody clicked a link or they had a poor password. Or something like that," Moore explained.

Simply not paying attention and clicking links from unknown email addresses could also be a big problem, Moore warned.

Another big issue are social media platforms. Websites and companies generally make public announcements when they know their customers’ information has been compromised, but what if it’s already too late?

The best defense is making a difficult password. One that has a combination of letters, numbers and symbols.

Something else to remember is your cell phone, according to Symantec, the company that produces Norton Anti-Virus software. Consumers should only download apps to their phone through approved stores. For Apple users it is the "App Store" and for Android users it's "Google Play."

Third party app stores have apps that could contain malware which could help the bad guys steal your personal information right off of your cell phone.

NBC

You Might Also Read: 

Going Postal: ‘We Have Sent You a Message’:

IoT Is In The Dark When It Comes To ePrivacy:

 

 

« Sydney Airport Steps Up Cybersecurity
China Gives Police New Powers To Spy On Foreign Firms »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Northbridge Insurance

Northbridge Insurance

Northbridge is a leading Canadian business insurance provider. Services offered include Cyber Risk insurance.

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

Global Learning Systems (GLS)

Global Learning Systems (GLS)

Global Learning Systems provides security awareness and compliance training programs for employees that effectively promote behavior change and protect your organization.

BSA - The Software Alliance

BSA - The Software Alliance

BSA is the leading advocate for the global software industry before governments and in the international marketplace.

NopSec

NopSec

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

e-End

e-End

e-End provides hard drive shredding, degaussing and data destruction solutions validated by the highest electronic certifcations to keep you compliant with GLB, SOX, FACTA, FISMA, HIPAA, COPPA, ITAR.

Braintrace

Braintrace

Braintrace’s services include Managed Detection and Response (MDR), Managed SIEM, SIEM-as-a-Service, SOC-as-a-Service, Advisory Services, and Incident Response.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.

TRM Labs

TRM Labs

TRM enables risk management and compliance for a global community of financial institutions, cryptocurrency businesses and government agencies.

Exodata

Exodata

Exodata is a French digital services company specializing in the outsourcing of IT Systems and solutions.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.

RST Cloud

RST Cloud

RST Cloud is a cutting-edge technology company that specialises in threat intelligence solutions for businesses of all sizes.

Secure Cyber Management

Secure Cyber Management

Secure Cyber Management provides industry-leading cloud security advice, guidance and services.