Tag Archives: Cyber Security

Ethical Hacking is Used to Beat Cyber Criminals

The theft of customer data that is used by hackers for financial gain requires companies to ensure their data is protected. This is done using ethical hacking that tests the security of current IT infrastructure. The ethical hacking of your … Continue reading

Posted in Cyber security, Ethical Hacking | Tagged , , , , , | Leave a comment

Tips to Avoid Digital Hoarding

Digital hoarding has become a major problem in the cyber-age as people refuse to get rid of files and e-mails which then clog up their hard drive space. Continue reading

Posted in Cyber security, IT and Computer Security, Uncategorized | Tagged , , , | Comments Off on Tips to Avoid Digital Hoarding

Don’t Be a Victim: How to Prevent Identity Theft (Part Two of Two)

Superior Solutions provides more steps to take to prevent identity theft in this two part series Continue reading

Posted in Cyber security, IT and Computer Security, Uncategorized | Tagged , , , , , | Leave a comment

Cyber Security Bill Stalled… But Sponsors Still Push On

Cyber security continues to be an ongoing challenge with no easy answers… Earlier this month, the senate failed to pass a bill known as the Cybersecurity Act of 2012.  The sponsors of the bill are still pressing the issue with … Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security | Tagged , , , | Leave a comment

Should You Put Your Data in the Cloud? Is it Safe?

Superior Solutions shares some of the key features, including security features, you want to look for in a cloud network storage provider. Continue reading

Posted in IT and Computer Security, Uncategorized | Tagged , , , , , , , , | Leave a comment

Cyber Bodyguards

The concept of cyber bodyguards may seem far-fetched, but it’s something that corporate America already has adopted.  CEO’s, business owners, and companies working through mergers, acquisitions, and IPO’s routinely use. This is one area where Hollywood has lagged behind. Celebrities … Continue reading

Posted in Ethical Hacking, Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment

Is It Ok For My Child To Be On Social Media?

The question must be asked—is online social media still an adults-only realm or should children be allowed to dip their toes in these waters? Continue reading

Posted in IT and Computer Security, Uncategorized | Tagged , , , , | Leave a comment

My 5 Tips for Passing the New ISC2 Electronic Based CISSP Exam

Did you know that ISC2 is planning a big change to the CISSP exam?  Anyone studying for or planning for the CISSP exam needs to be aware of the upcoming change. Starting September 1, 2012, ISC2 will offer the CISSP … Continue reading

Posted in Security Certification, Training and Education | Tagged , , , | Leave a comment

Where Did You Leave Your Smart Phone?

Did you know that over 5.6 billion people own/use at least one cell phone? In the United States alone, over 91% of the population owns and/or uses a cell phone. Thankfully, many cell phones now have the technology to protect and to find your lost cell phone. Continue reading

Posted in IT and Computer Security, Smart Phone Hacking, Uncategorized | Tagged , , , , | Comments Off on Where Did You Leave Your Smart Phone?

What Color is Your Cyber Hat?

People associate the term “hacker” with an individual who has malicious and/or criminal intent, has enough knowledge about computers to make them very dangerous, and are not to be trusted. Sometimes, they might be right. Sometimes, they couldn’t be farther from the truth. Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Security Certification, Training and Education, Uncategorized | Tagged , , , , | Leave a comment