Protecting Personal Data

Cyber criminals don’t take a day off and neither should consumers when it comes to keeping your devices and your personal information safe. That’s the advice from North Texas cybersecurity expert Michael Moore, founder and CEO of M3 Networks.

"The most important thing to know about cybersecurity is that the attacks come from the inside, out," Moore said.

What does that mean exactly? Moore said many times we are the ones to blame for our own cybersecurity misfortune. Consumers are generally the ones who make it easy for cybercriminals to strike. Lack of training is a big part of that.

"Employees that haven’t been trained well on Ransomware. Somebody clicked a link or they had a poor password. Or something like that," Moore explained.

Simply not paying attention and clicking links from unknown email addresses could also be a big problem, Moore warned.

Another big issue are social media platforms. Websites and companies generally make public announcements when they know their customers’ information has been compromised, but what if it’s already too late?

The best defense is making a difficult password. One that has a combination of letters, numbers and symbols.

Something else to remember is your cell phone, according to Symantec, the company that produces Norton Anti-Virus software. Consumers should only download apps to their phone through approved stores. For Apple users it is the "App Store" and for Android users it's "Google Play."

Third party app stores have apps that could contain malware which could help the bad guys steal your personal information right off of your cell phone.

NBC

You Might Also Read: 

Going Postal: ‘We Have Sent You a Message’:

IoT Is In The Dark When It Comes To ePrivacy:

 

 

« Sydney Airport Steps Up Cybersecurity
China Gives Police New Powers To Spy On Foreign Firms »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BMC Software

BMC Software

BMC provide solutions for IT service management, Cloud management, IT workload automation, IT operations, and mainframe system management.

AirCUVE

AirCUVE

AirCUVE provide authentication and access control solutions for networks and mobile security.

Pole SCS (Secure Communicating Solutions)

Pole SCS (Secure Communicating Solutions)

SCS is a world-class competitiveness cluster dedicated to digital technologies in the fields of Microelectronics, Internet Of Things, Digital Security, Artificial Intelligence And Big Data.

Ezenta

Ezenta

Ezenta is a Danish IT security consulting firm.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

Independent Security Evaluators (ISE)

Independent Security Evaluators (ISE)

ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research.

AdaptiveMobile Security

AdaptiveMobile Security

AdaptiveMobile Security, a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

SOCOTEC Certification International

SOCOTEC Certification International

SOCOTEC Certification International has been providing management systems assessment and accredited ISO certification services to organisations around the world since 1995.

CyPhyCon

CyPhyCon

CyPhyCon is an annual event exploring threats and solutions to cyber attacks on cyber-physical systems such as industrial control systems, Internet of Things and Industrial Internet of Things.

Accel

Accel

Accel is a leading venture capital firm that invests in people and their companies from the earliest days through all phases of private company growth. Areas of focus include cybersecurity.

Document Security Systems (DSS)

Document Security Systems (DSS)

DSS anti-counterfeit, authentication, and brand protection solutions are deployed to prevent attacks which threaten products, digital presence, financial instruments, and identification.

Soliton

Soliton

Soliton is a leading Japanese technology company and a pioneer in IT security solutions for protecting company resources and data from external IT security threats.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

Vector Choice Technologies

Vector Choice Technologies

Vector Choice Technology Solutions has a long standing reputation in cyber security consulting since 2008.

CyberNINES

CyberNINES

CyberNINES is a business specializing in helping US Department of Defense contractors become compliant and attest to federal cybersecurity regulation requirements.