Can AI systems be socially engineered?

Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally? When interacting with chatbots and other AI-powered tools, we typically ask them simple questions like, “What’s the weather going to be today?” or “Will the trains be running on time?”. Those not involved in the development of … More Can AI systems be socially engineered?

Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

While you’re enjoying the holiday season, cybercriminals could be gearing up for their next big attack – make sure your company’s defenses are ready, no matter the time of year. The festive holidays are almost here. Pretty soon, many of us will be sticking on our “out of office” and settling in for a few … More Cybersecurity is never out-of-office: Protecting your business anytime, anywhere

Delivering business security with extended prevention

Essential security can take care of most threats – but for businesses with larger networks, it might be time to extend the security envelope. We’ve written before about how multilayered security is key to protection success. Each layer represents a dimension of protection, tackling specific threats or attack vectors. The best security solution should tackle all of … More Delivering business security with extended prevention

Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks

Buying a pre-owned phone doesn’t have to mean compromising your security – take these steps to enjoy the benefits of cutting-edge technology at a fraction of the cost. The modern smartphone has become an indispensable piece of technology. These powerful, pocket-sized computers enable us to do everything from hailing cabs to consulting with our local … More Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks