What issues would face scanning attached to a mobile device resolve and, if used correctly, would it make the incursion into my privacy acceptable? On December 1st, China’s regulation requiring people to have their face scanned when subscribing for a new mobile phone took effect. If you were not aware of this regulation your initial … More Face scanning – privacy concern or identity protection?
An ESET-commissioned survey among enterprises also shows that while respondents in most countries agree on the need to bolster cyber-defenses, some are reluctant to adopt cybersecurity solutions. As technology evolves by leaps and bounds every year, so does the threat landscape and bad actors keep coming up with new threats. That’s not scaremongering, it’s a … More Can regulations improve cybersecurity? In APAC, opinions vary
Some tips that businesses can do to get better at it without breaking the bank. Here at RSA Small and Medium Businesses (SMBs) are squarely faced with the daunting task of securing the explosion of IoT devices, now ever-present in the business environment. In the past, IoT in a business setting could largely be ignored, but that’s no … More RSA – IoT security meets SMB
A strong password is a great start, but there are more ways to make sure that your email is as secure as possible. Email is a crucial part of most people’s daily lives, but few people consider how it’s secured, apart from entering a password to access our accounts. What options are available or even advisable to … More Email security does not end with your password
Your data is very, very valuable to the right (or wrong) people. Every single piece of data has value, it doesn’t matter how mundane it might seem, any and all data can be used to build up a profile of you for advertisers or could be the key to accessing your online accounts. Jake Moore, … More How do companies use your data?
Two-factor authentication is an underutilized security measure in businesses, yet it can greatly improve the security of an account. it is also recommended as one of the key factors in helping keep data secure in compliance with GDPR. Receiving an extra code to your phone when signing in, is a great obstacle for would-be hackers … More Google Gmail’s Two-Factor Authentication. Know how to set it up? It’s easy!
Fraudsters are using bogus apps to convince users of three Indian banks to divulge their personal data. Another set of fake banking apps has found its way into the official Google Play store. Claiming to increase the credit card limit for users of three Indian banks, the malicious apps phish for credit card details and … More Fake banking apps on Google Play leak stolen credit card data