Join this free webinar to learn how leading brands are adapting to meet the needs of their customers in social media. The panel includes Dan Gingiss of Discover and Kristina Libby of Microsoft. Register here!
These days, Facebook hacking is a pretty commonplace activity. Given this, Facebook has released an updated “ Security Checkup ” tool that will prompt all users to review and update their security settings to ensure they’re aware of who’s accessing their accounts and what apps they’ve given permission to utilize their information.
The more you know about your customers, the better you can serve and give them the products they want. In return, the more they trust and become loyal to your brand. But with all the information you gather from your customers to provide one-to-one service and personalized products comes the responsibility to take care of their personal data.
Do you think it’s legal to collect data transmitted over unencrypted WiFi networks? Google does. This month, Google asked the U.S. Supreme Court to review an earlier federal appeals court decision that could make it liable for hijacking data from unencrypted WiFi networks in neighborhoods that were part of its Street View program.
It seems an insane irony that amid the more than $60 billion dollars we spend annually around the world on information security, we routinely fail to secure some of the most mission-critical information from a totally obvious risk. The problem may be old, but there is a new solution.
They're so popular, those ubiquitous mobile devices. For better or worse, we've evolved into a society that is a texting, online-banking, TMI-ing, forever-connected, 24/7-kind of world. But have you ever considered the negatives when you're doing all that in a public wireless hotspot?
It has never been top-secret that online activity is far from being private. Chat, email, photos, videos, file transfers, social networking data: they may be accessed through the click of a button, at any given time or place. Here are a few methods for keeping your private data away from Internet companies, and even the public.
Using no more processing power than what’s found inside a basic smartphone, it is now possible to generate all possible 8-letter passwords in a few hours. It’s shocking how many companies still rely on nothing more than username and password to secure sensitive data.