Over 90 percent of people in the United States feel like their data is out of their control, and judging from the impression that the European...
Reciprocal Technologies Blog Security • Page 28
Phishing Attacks Are Besting Two-Factor Authentication–Now What?
What has proven to be one of the more effective ways of preventing phishing attacks may be under fire from more advanced threats designed...
Taking a Trip Through Data Privacy, Part II
Earlier this week, you may have seen the first part of this article, where we discussed how robocallers collect your information. Today, we continue...
Taking a Trip Through Data Privacy, Part I
Protecting your business’ data is no simple task. To make it as secure as possible, you’ll have to understand how personal data flows through online...
5 Reasons IT is Stressed About Security
If you have an internal IT administrator, they might be pretty stressed about your business’ security. Why? Simple - there’s a good chance that they...
Pressing the IT Security Issue
It wasn’t so long ago when your business could get away with protecting your computer with a simple installation of antivirus software. There were...
Tip of the Week: Avoid Facetime Spying
Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug...
Powerful Physical Security Options
Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals...
The Marriott Hack Exposes 500 Million People
It’s nice to get away every now and then, but if you have stayed at any property under the Marriott umbrella, including St. Regis, Westin, Sheraton,...
Google Play Works to Reduce Ad-Fraud
What’s a smartphone without some apps to download to it? With millions of apps to choose from, developers might often have less-than-virtuous...