Are Mobile Payments Right for You? Stay Safe When Paying with Your Phone

Using Your Phone as Your Wallet

If you are a frequent Starbucks visitor, you may have been an early adopter of the Starbucks app and been quickly introduced to mobile payments, or the “pay with your phone in-store” concept, when it was launched in 2011. A report by eMarketer says you were not alone, and today there are more than 23 million consumers using the Starbucks app for in-store purchases at least once every six months. Continue reading

Building Barriers Against the Top Three Business Fraud Threats

**Originally published July 7, 2015, updated July 22, 2019**

Fraudsters are always in the market for a lucrative new target. So, what’s the most information-rich, security-poor victim they can exploit? A small business, of course.

According to the Association of Certified Fraud Examiners (ACFE), an organization on average loses a whopping 5% of their revenue to fraud each year — that’s potentially a global total loss of $4 Trillion dollars. And small businesses are impacted disproportionately harder by fraud, with a median loss of $200,000 for businesses with less than 100 employees. That’s almost twice as much as the median loss for companies with more than 100 employees ($104,000.)

Thankfully, there are a few tricks small business owners can use to combat potential fraud. And the best place to start is by looking at the main entry points of exploitation: occupational fraud, cyberattacks, and identity theft.

Continue reading

There’s No Expiration Date for Your Data on the Dark Web

Frozen Clock represents No Expiration Date Data Dark Web

With data breaches impacting organizations on what seems like a daily basis, there’s a very good chance that your personal information has been compromised — and once it is leaked onto the Dark Web, you are vulnerable forever. According to the 2018 End-of-Year Data Breach Report, the total number of data breaches decreased in 2018, however, the number of stolen records climbed more than 126 percent. Not only is that a significant increase in the amount of Personal Identifiable Information (PII) that is now in the hands of cybercriminals, but it is also an indication that breaches have become larger, exposing more pieces of data per incident. Continue reading

VPN: An Essential Tool in Your Security Toolbox

VPN Security Tool on Mobile Device

Everything You Need to Know About VPNs

Are you reading this blog post on a Virtual Private Network – a VPN? If you are, you can stop right here. You’re probably well versed already on the added online security this easy-to-use tool offers. But, if you’re unfamiliar with VPNs, this article is for you. Because people who use the Internet – everyone, in other words – should do so over a Virtual Private Network. Continue reading