Cyber Threats

  • Home
  • Posts Tagged "Cyber Threats"
Protecting Your Digital Privacy: Practices, Tools, and Using Professional Security

Protecting Your Digital Privacy: Practices, Tools, and Using Professional Security

How exposed is your personal information online? Learn what PII might be found on the open and dark web, what it means for your security, and digital privacy best practices to protect your online footprint. In an era where our lives are increasingly intertwined with digital technologies, safeguarding our digital privacy and data security has ...
Read more

Businessman, digital tablet or strategy planning in hotel conference lobby or airport travel lounge. Happy smile, corporate worker or technology app to budget company finance or schedule target goals

Cyber Security Tips For Traveling

Cyber security is one often overlooked—yet critical—element of travel preparedness. Here are some practical tips to prevent cybercrime when traveling domestically and internationally. With the summer season upon us and travel returning to pre-pandemic levels, smart travelers will be making all the necessary preparations for their time on the road, from making reservations to updating ...
Read more

Hospitality Cyber Threats Are Alive & Well – Lessons From Recent Incidents

The data incident involving the Starwood guest database was one of the most significant data security incidents in recent years. Publicly announced on November 30, 2018, the details revealed in the days and weeks following the announcement contain some striking reminders and new lessons for the hospitality industry. Here are some of the key facts ...
Read more

Preventing Cybercrime

HOW TO RESPOND TO COMPUTER POP-UPS. In addition to being annoying, computer pop-ups or notifications are often the first step a cyber-criminal uses to victimize unsuspecting users. Be cautious of any notification or pop-up messages. Examples include emails that say you have to download something in order to see a greeting card or a message ...
Read more

Hotel Operators Need to Address the Asymmetric Threat

It’s happened again-a terrible attack on a hotel, followed a few days later by the deadly commandeering of an ambulance and its subsequent use as a bomb. Afghanistan, more than 16 years after the US and its NATO allies first launched an all-out assault on the Taliban and Al Qaeda, continues to be a hotbed ...
Read more

Cloud Computing Crash Course: Safety First

When it comes to privacy and security laws governing sensitive data, you don’t have to be a financial or health institution to have information that is subject to state and federal regulation. Almost every organization with employees stores some personally identifiable information. Simply storing an employee’s name, email address and date of birth will be ...
Read more

Cloud Computing Crash Course: Location, Location, Location

Cloud computing is the practice of enlisting a “cloud provider” to deliver data, applications and storage to users through the internet, which allows each user to share the computing resource and forego some on-premise technology. Cloud computing is generally categorized into three buckets. The cloud provider may: Host applications, thereby eliminating the need to install ...
Read more

Cybercrime and Data Breach a Rising Threat to all Employers

Over the past six months, we have observed a significant uptick in inquiries about data breach and other cyberthreats from area businesses.  We are asked about pursuing claims for recovery of funds lost due to fraud by hacking, state notification procedures in the event of a data breach affecting employees, and general questions about how ...
Read more

It’s Time to Investigate Cyber Insurance

Most IT leaders plan for cyber-attacks by constructing firewalls and installing security hardware and software. Even so, with the widespread proliferation of malware, companies are finding that their IT infrastructure has been attacked, customer data has been compromised, the IT system is being held for ransom, and assets are missing. Almost every day there are ...
Read more