Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

April 2024

How to Recognize and Avoid Publishers Clearing House Scams

The Publishers Clearing House (PCH) appeared in 1967, promoting magazine subscriptions, merchandise, time-share vacations, and their famous cash prize sweepstakes. Since 67’ over 11 million people have won PCH sweepstakes, totaling over $593 million in cash winnings. More people than ever have entered the PCH sweepstakes, looking for their chance to win thousands - sometimes millions - of dollars overnight.

Red Flags of Jobs and Employment Scams: How to Protect Yourself

Job scams continue to rise in the United States as of 2024. According to the Federal Trade Commission (FTC), Americans lost about $490 million to job opportunities and employment scams in 2023, with 107,134 reports. This was a significant increase over 2022, with 95,327 reports of employment scams and a $373.5 million loss to these scams. Besides financial losses, scam artists are also conning unsuspecting job seekers out of their personally identifiable information.

Top 6 Secure Payment Methods

With cyber threats on online payment methods becoming more common in today's digital age, ensuring that payment systems are secure and sensitive information is not hijacked when making payments has become ever more critical. To ensure that you choose the right option when making payments online or physically, we have compiled a list of the top 6 most secure payment methods. These payment options prioritize security, offering robust features and protections to safeguard your financial data.

What Is Cloud Security?

Cloud computing has gained traction in recent years due to its ease of scalability, flexibility, and efficiency. It allows businesses to accelerate innovation and spend less in meeting client or consumer demands. With several businesses migrating their operations to the cloud, cloud computing has become the technology of choice as it becomes more readily accessible and affordable.

6 Airbnb Scams To Watch Out For

Airbnb has brought a new paradigm to the hospitality industry. It has become the go-to platform for persons looking to make additional income with their properties and travelers looking for unique accommodation experiences away from home. However, this new model and its appeal have also attracted individuals looking to exploit the platform for fraud. Scams on Airbnb are becoming increasingly common, as both hosts and guests are not left out from becoming targets.

Credit Card vs Debit Card: Which Is Safer?

Identity theft and card fraud are the main concerns associated with using debit and credit cards. Like any financial instrument, credit and debit cards are susceptible to certain security threats that can compromise cardholders' information and lead to credit card fraud or debit card fraud. Common examples of such financial security threats include card theft, phishing, skimming, malware, card cloning, vishing, weak passwords/PINs, and social engineering.

What is Sensitive Data: How to Protect Important Personal Data

Sensitive personal data is among the most valuable information attached to us; it’s so valuable that there are international regulations for its maintenance, storage, and management. It is data that contains essential details about us, like Social Security Numbers (SSNs), bank accounts, tax IDs, health insurance data, and all the other “unique-to-one” credentials.

What is Single Sign-On: The Benefits and Importance of Implementing SSO

Every day, more people get online - most do it for leisure, but organizations are increasingly moving into the digital environment. The increasing number of these new end-point users makes it clear that the cyber world must evolve. No longer can experts argue for unique platform passwords when password fatigue is prominent, nor can cybersecurity defenders protect all the various attack junctures across multiple platforms and tools.

Personal vs Sensitive Personal Information (SPI): What's the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation? The nuanced information about a person—including those elements listed above and more—falls into a data category called “personal information” or “personally identifying information” (PII).

What is Bait and Switch Scams: How it Works and How to Avoid It

Ever follow an ad featuring limited-time products to a company’s web page only to find they’re selling something else entirely? Or have you added a product to a cart only to discover a laundry list of issues, from poor quality to endless fees? Bait and switch (also called “bait-and-switch” or “B&S”) is a classification of fraudulent activities that most recognize as false advertising.

What Is An On-Path Attack and How Does It Work?

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination? If nothing happened, the driver (our data) traveled safely and without incident.