A Defense Playbook for Diffusing CCTV Cybersecurity Threats
It can be especially vexing when criminals turn our own security technologies against us, as they are doing in closed circuit television (CCTV), IoT, and other video security devices. In…
It can be especially vexing when criminals turn our own security technologies against us, as they are doing in closed circuit television (CCTV), IoT, and other video security devices. In…
Cyber surveillance is no longer the forte of intelligence agencies. Many tools can access and monitor your computer, laptop, smartphone, tablet, etc. So, you may wonder if someone can see…
We’ve probably all read horror stories online: a parent is woken in the middle of the night by strange noises coming from their child’s bedroom. They open the door, only…
In the property world, smart technology is enjoying a boom in popularity. From home monitoring devices such as doorbell cameras and motion sensors to smart thermostats and lighting, we live…
Cybersecurity attacks within K-12 districts have become an imminent threat. Seemingly, a new school district is highlighted every week. Ransomware attacks, which have compromised the most sensitive school district data…
Stalking or cyberstalking is illegal and immoral behavior. However, there are scenarios in which we would like to find someone’s address or location. Find a long-lost friend, know where your…
Is it illegal to film someone without their consent? If the person is visible and audible, and they do not have reasonable expectations of privacy, it is not illegal to…
If you’ve ever felt like you’re being watched, you very well could be. As cameras get smaller and resolutions get higher, they can be put in just about anything.This week…
Traveling for work or pleasure can be a stressful time, especially if you must leave your home and your pets in someone else’s care. However, leaving your home can also…
If you choose to work in a co-working space shared by start-ups, remote workers, and freelancers, the risk of cyberattacks is tenfold because workers use open WiFi. And if you're…
When you suspect your partner of cheating, the options can seem endless when it comes to finding proof. You could hire a detective, follow them around town, or even plant…
You've poured over dozens of vacation rentals to find the perfect one for your next getaway. You've spent a ton of time planning the trip and you’re super excited to…
Networked doorbell surveillance cameras like Amazon's Ring are everywhere, and have changed the nature of delivery work by letting customers take on the role of bosses to monitor, control, and…
When you discover that your personal information has been hacked, your first thought may be, why me? Why couldn’t it have been someone else? In truth, you might have fallen…
When you stay in a hotel, or use public restrooms, or even go to trial rooms in clothing stores, it’s good to ensure there aren’t any hidden cameras. While authorities…
If outsiders somehow get inside your network, it won’t be pleasant — no matter what. However, you can minimize the potential damage of such a breach by thinking ahead about…
Have you ever spent hours upon hours looking up one person's life history on their Facebook page? Social media allows us to “accrue these large caches of quote-unquote friends.” We…
In the current digital age, hacking has become a common issue that we all have to be conscious of. It is essential to protect your information and digital devices because…
Can you be fired for refusing to turn on your webcam for business purposes? If you're in the US, maybe.A US company was ordered to pay $73,000 to a Dutch…
New York City, home of the largest rapid transit system in the country, will install surveillance cameras in every NYC subway car by 2025, Gov. Kathy Hochul announced Tuesday.The move…
October is Cybersecurity Awareness Month. We know you are busy running a small business and cybersecurity can be complex and overwhelming. Here are some counter-action items you can take to…
Have you ever stood in front of an empty room and wondered what may be lurking in the shadows? The rise of illegal recording devices means that no place is…
Home intrusion, location tracking, and identity theft are not the things you think of when you buy a smart lock, baby camera, or any other IoT device. Unfortunately, if you…
Online stalking entails unwanted interaction with others, harassment, or stalking via any type of electronic gadget, including but not limited to PCs, networks, and cell phones. Even bullying may be…
Workers should be aware that many online work apps offer data about their daily activities. But workplace and privacy experts say data from these work apps should be considered only…