April 3, 2020

How-To

Zoom has caught a fair amount of flak recently for sub-par security standards and features, despite the CEO of Zoom recently posting a blog addressing concerns and promising security improvements.

Here are a few tips to help make your Zoom meetings more secure:

Read More

March 31, 2020

Cyber Security

The deepfake creation process is long and slow, at least on a general consumer-level setup, as the computer must be “trained” to recognize the images that it is being shown. Two unique visual feeds are given to the computer, such as in this example, Linus of Linus’ Tech Tips and Louis Rossman, a fellow YouTuber. The two feeds are thoroughly examined by the computer, then mashed together. Deepfakes can replicate voices as well. More sophisticated labs have been able to create deepfakes within hours.

From the point of creation, the rest that remains is to simply post the video to social media and watch the views tick up.

Read More

March 20, 2020

Cyber Security

Years ago, identity theft was largely centered around stolen wallets, overhearing phone conversations, going through the trash, finding an account number on a gas station or restaurant receipt, or stealing a credit or debit card.

However, with the amount of sensitive information that is stored online today, it has grown easier to become a victim of identity theft through no direct choice of your own. Business and government databases are an attractive bait for cybercriminals, as this information is useful in many applications, be them for malicious, research, or business reasons.

Read More

March 18, 2020

Cyber Security

Federal law, via the FTC, requires businesses to maintain an information security plan to protect their clients’ data, no matter the business’ size. It is wise to proactively contact an IT security firm in advance to set up a security plan.

Read More

March 17, 2020

How-To

Even in handling identity theft, the best offense is a good defense. Visit IdentityTheft.gov for tips on how to secure your personal information before it is leaked online and put into the wrong hands.

Read More