Past Issues

Tech


Smart strategies: 5 ways to hack-proof your company smartphone

Since the introduction of the smartphone, developers have created apps — hundreds of apps — that allow most entrepreneurs to control almost every aspect of their business: email, CRM, accounting, social media … the list is endless.  

With the rise of the popularity of smartphones, hackers have turned their attention away from computers and now focus on hijacking mobile devices and the accounts associated with them. (more…)

A Breach Is Just the Beginning: Make It the End by Monitoring the Dark Web

Hacking used to have one major barrier to entry: talent. Unfortunately, the dark web has enabled individuals with nothing more than a bad attitude and a small amount of spare cash to buy sophisticated hacking tools. This means that your data is more vulnerable than ever before.

When your business’s data is breached, criminals aren’t just getting personal information — they’re potentially getting all of the login credentials for every user on the breached website or platform. (more…)

How to Spot Phishing Attempts Before You’re on the Hook

In the security world, it seems like every day brings another story of customer data being compromised. One of the latest examples comes from Children’s Mercy Hospital, where patients are still finding their data endangered after an email phishing scam hit more than 60,000 individuals back in January. (more…)


Contact


  1. (913) 432-6690
  2. PO Box 754
        Shawnee Mission, KS
        66201-0754
  3. editor@ithinkbigger.com

Connect

  1. Facebook
  2. Twitter
  3. Linked In
  4. Google Plus