More Technology Means More Cyber Risks: What You Should Know to Stay Safe

When was the last time you logged into your computer, connected to an app via your smartphone or asked your internet-connected personal assistant a question? Chances are, it was just a few minutes ago.While there are significant benefits such technologies bring to our lives (namely convenience), it’s important that we don’t overlook the corresponding cyber exposures. The good news is that most Americans recognize these risks, with 86% reporting that they are “very” or “somewhat” concerned about their cyber exposure in a recent Chubb survey. The bad news, however, is that such concern doesn’t always translate into action. Why the mismatch? The answer is that most don’t understand the full extent of their cyber vulnerability. Continue reading

Posted in Cyber | Tagged , , , | Leave a comment

Forget Finding Work-Life Balance.
It’s About Achieving Work-Life Security

hen was the last time you worked 9-to-5? Chances are, not for a while. In fact, it’s a safe bet you’ve worked longer hours than 8-to-6 or 7-to-7 recently. Why? Because in today’s connected world, it’s “always on” all the time.

While there is an important debate to be had about the long-term impact this has on our mental health, there is an immediate risk that can’t be ignored (and can arguably cause long-term stress!): cyber breaches. This is particularly true for the two-thirds (65%) of Americans who noted in a recent Chubb survey that they work from home and the additional 38% who reported conducting business on a personal device. Continue reading

Posted in Cyber | Tagged | Leave a comment

While You’re Away, Cybercriminals Will Prey

Summer is a great time to get away and relax, but for many, safety remains a number one concern. In fact, 72% of U.S. travelers say they would pay more for vacation if they could ensure greater security, as well as … Continue reading

Posted in Cyber, Home, Safety | Tagged | Leave a comment

Protecting Personal Information

A growing privacy and cybersecurity risk is that cyber criminals are actively seeking Personally Identifiable Information (PII) and payment card data. This is accomplished by either stealing PII from personal and home devices, or hacking into data stored by large organizations.

Using a computer and visiting a website are not the only way to potentially expose your information to criminals. Emerging threats, such as voice over internet (VoIP) and wireless devices and applications, have added a host of new avenues for security breaches. For example, if your phone is connected via the internet, it may not be protected by firewalls that are configured for VoIP security. Think about this when it comes to privacy: How often are you disclosing personal or financial information over the phone, such as when ordering an item, making a payment on a credit card, or accessing any organization using an account number? You can quickly see that all of these conveniences are leaving you vulnerable.
Continue reading

Posted in General Risk | Tagged , , | 1 Comment

The Cybercrime Financial Threats You May Be Overlooking

Technology has become an integral part of everyday life. However, with nearly 400,000 identity theft complaints reported to the government in 2016, it’s no secret that the benefits of technological advancements are accompanied by numerous, unforeseen threats that leave personal, financial and intellectual information vulnerable to theft. Continue reading

Posted in General Risk | Tagged , , | Leave a comment

Can You Be Spared from Hackers?

Staying safe online and preventing hackers from stealing your identity or personal information doesn’t seem to be so easy to do these days. In recent months, organizations ranging from social media networks to Internet services companies have made headlines when … Continue reading

Posted in General Risk | Tagged , | Leave a comment

Are You Practicing Safe Gaming?

In a gamer’s quest to win big, many will overlook the broader cybersecurity risks of online gaming. Many app users remain woefully unaware of how unsafe gaming can lead to real-life vulnerabilities. I’ve outlined a few tips to better protect yourself below. Continue reading

Posted in General Risk | Tagged , , | Leave a comment

Password Practices Key

The announcement this week that a cache of five million passwords allegedly belonging to Gmail accounts has been posted to an online message board in Russia provides another reminder about the importance of creating — and routinely changing — strong … Continue reading

Posted in General Risk | Tagged | Leave a comment