Privacy & Surveillance

The Plight of Exhuming or Burying Digital Remains

As concerns over digital privacy grow there has been much debate on the digital past-life of the now deceased. How does one access once private accounts well protected by users when alive but now dead? Until now, you would only have such...  [Read More]

Handle Sensitive Information Differently

If you have highly sensitive information, think about an entirely different way of handling it from your normal email, collaboration, and other systems. If it is the kind of information that can cost you an immense amount if it is compromised, it...  [Read More]

Lessons Learned From a Password Manager

Have you always wondered about using that online password management system that you keep seeing advertised on websites you visited? Or do you already use a web based online password manager account to store all of your complicated passwords that you usually...  [Read More]

Taking a Bite out of Cybercrime at Restaurants

Another well known business has reported a cyber breach, this time the well known Chinese restaurant chain PF Chang’s. The business confirms the breach and indicates that cards used between March and May of this year may be compromised. In this case...  [Read More]

Is Your Social Media Profile Protected Against Hacking?

Hacking is an unfortunate fact of life today. If you have an email address, a social media account, a website, or use any type of online services, you are vulnerable to hacking. Anyone who has been using the internet for a period...  [Read More]

Empowering People to Protect Their Online Privacy

Terrorism and counter-intelligence, the meaning of those words have dramatically changed over the past twenty years…people generally don’t think of terrorism when they think of cyber, but they should.” – Special Agent Daniel Elfin, Special Agent, FBI, January 29, 2013 while speaking...  [Read More]