Let's Talk
Welcome to the EiQ Networks Blog

Improving Your Online Privacy in Five Easy Steps

Posted by John Linkous on Apr 18, 2017

Most of us think about information security in terms of what hackers, malware, and other bad actors can do to compromise our systems and data.  And while that’s certainly a critical concern, we sometimes forget about another aspect of information security: protecting our privacy.  The privacy debate is one that has raged for many years.  Today it is often equated with government intrusion, and while this is certainly a legitimate macro-level concern, there are other sinister threats that can be realized when we lose our digital privacy; identity theft, cyberstalking and online bullying, and physical assault due to location disclosure from digital assets (think geolocation inside of devices and geotagging metadata within digital media) are all real-world risks if we don’t protect ourselves.  And while privacy and security are not the same thing, good security definitely improves privacy.

There’s More than Meets the Eye: Going Beyond Covering Your Laptop Camera

Posted by Shawn O'Brien on Aug 10, 2016

 

In June 2016, Facebook CEO Mark Zuckerberg made The New York Times for covering his laptop camera with tape. The following explains why individuals choose to block their webcam lenses, and why this cybersecurity technique is not enough.

Will Brexit Bring Surge in Cybercrime?

Posted by Trevan Marden on Jul 12, 2016

 

On June 23rd, UK voters passed a referendum to leave the European Union, spurring much debate on what political, social, and financial impact this move will have on other European Union countries, as well as the impact on the global economy. Within the information security world, experts have also begun discussing the possible impact on cybersecurity.

 

Ideas on the topic have ranged widely, from the expected surges in phishing and malware exploiting fears and confusion on the topic, to shifts in cybersecurity hiring, changes in privacy protections, and other challenges.

3 Critical Steps SMEs Should Take to Protect Their Customers' Private Data

Posted by Vijay Basani on Feb 25, 2016

 

Headlines generally focus on hacks of large corporations, but cyber criminals are increasingly targeting small and medium-sized enterprises (SMEs) too. Due to their size, SMEs are more at risk of cyber attacks: they often lack the funds to enforce strong cybersecurity practices, and if they work with large companies, they're especially enticing to hackers. In light of such threats, SMEs need to ensure their customers' private information will be kept safe from hackers.

 

Here are three big picture steps smaller organizations can take to defend themselves.

Reality Check: The Harsh Truths About Cybersecurity

Posted by Shawn O'Brien on Oct 21, 2015

You don’t have to look far to see how willing people are to exchange difficult truth for reassuring fiction, and the world of cybersecurity is a good example. As part of National CyberSecurity Awareness Month, here are some ways to think about cybersecurity.

Education Security: 5 Simple Ways to Protect Education Records

Posted by Vijay Basani on Aug 6, 2015

Because we feel, with good reason, that children are special, we tend to forget that the technology used to teach them, keep their records, count attendance, and send out grades is anything but.

Edtech, as it’s called, is as vulnerable as any other technology. Because education is an increasingly profitable sector, the data it produces—from K–12 through university graduate programs—is susceptible to the same forces as the rest of world. In particular, you see the same corner-cutting on the part of developers and the hacking by criminal gangs and nation states.

The most recent instance of this vulnerability? Impero Education Pro.

To TOR or not to TOR – that is the question

Posted by Security Steve on Sep 29, 2014

The protection of an individual’s privacy and data in the internet wild-west looks to be bubbling up as a hot topic. There’s often 3 competing forces in the discussion. On one side you have the internet service provider stipulate a bunch rules that define what an individual can and cannot do on their networks. On another side you have law enforcement that wants to ensure that laws aren’t being broken. And on the third side you have the consumer, who in most democratic societies have some legal rights to privacy and illegal search and seizure. This is not a new debate.

The Difference Between Data Privacy and Data Security

Posted by Shawn O'Brien on Sep 9, 2013


Although data privacy and data security are often used as synonyms, they share more of a symbiotic type of relationship. Just as a home security system protects the privacy and integrity of a household, a data security policy is put in place to ensure data privacy. When a business is trusted with the personal and highly private information of its consumers, the business must enact an effective data security policy to protect this data. The following information offers specific details designed to create a more in depth understanding of data security and data privacy.

Subscribe to Email Updates

How Prepared Are You to Battle Cyber Attacks?

Find out with EiQ's free cyber security readiness assessment!

Find Out Now!

Posts by Topic

See All