Trust Guard Blog

Goodbye Hackers! Hello Sales!

  • Home
  • Features
  • Commentary
  • News
  • Get Started

Common Traits of Trolls and Hackers

December 12, 2016 By James Wales Leave a Comment

Common Traits of Trolls and Hackers

Trolls and hackers are similar to each other in several ways. Both species are annoying and enjoy causing problems. I’m not talking about the trolls that try to upset everyone in online forums with rude and obnoxious posts. Although, who’s to say that that’s not how hackers spend their free time. Here are five ways […]

Filed Under: Commentary, Trust Guard Tagged With: cyber attacks, cyber-security, hackers, identity theft, personally identifiable information, trolls, unsafe websites, vulnerabilities, website security

Websites are Like Banks with Unlocked Windows

December 5, 2016 By James Wales Leave a Comment

Websites are Like Banks with Unlocked Windows

Even in today’s world of secure video technology, there are still banks that get robbed every so often. But usually, it’s not because of carelessness. In addition to other security precautions, for example, banks usually lock their windows. E-commerce websites need to be just as secure as offline banks. The problem is, many online business […]

Filed Under: Commentary, Trust Guard Tagged With: cyber crime, cyber-security, data breach, hackers, Like Banks with Open Windows, Payment Card Industry, vulnerabilities, website security

Hackers Are Bullies!

November 28, 2016 By James Wales Leave a Comment

Hackers Are Bullies!

There has been a ton of emphasis on bullying lately. Many good-hearted people are attempting to remove it permanently from the schools. With so much focus, it’s a wonder we haven’t discussed the role that hackers play as bullies. We often hear about the abuses they’ve performed on big, strong companies like Yahoo, Google, Best […]

Filed Under: Commentary, Trust Guard Tagged With: Bullies, costs of website security, cyber crime, cyber-security, hack-proof, hackers, Online Bullies, vulnerabilities, website security

The Top Three PCI Compliance Mistakes

November 17, 2016 By James Wales Leave a Comment

The Top Three PCI Compliance Mistakes

The truth is that most business owners misunderstand PCI compliance and website security in general. That’s why mistakes – avoidable mistakes – are made. The result is significant economic, legal and reputational problems. Some online businesses get hacked just when they start producing revenue. Others have their websites compromised when they’re making millions. Regardless, it’s […]

Filed Under: Trust Guard Tagged With: costs of website security, cyber attacks, cyber crime, cyber-security, data breach, data security, hackers, identity theft, Payment Card Industry, PCI DDS, vulnerabilities, website security

New Book Says “The Hackers are Coming!”

November 9, 2016 By James Wales Leave a Comment

New Book Says “The Hackers are Coming!”

Learn how to improve your online security skills by reading Ronald Nutter’s new book “The Hackers Are Coming.” This online security expert will help you choose the best password management and two-factor authentication tools. These tools won’t keep breaches like the one at Yahoo from happening, you’ll need daily vulnerability scanning to even have a […]

Filed Under: News Tagged With: cyber-security, data security, hack-proof, hackers, passwords, two-factor authentication, vulnerabilities, website security

Tips During Cybersecurity Awareness Month

October 22, 2016 By James Wales Leave a Comment

Tips During Cybersecurity Awareness Month

No matter what type of online business you do, all websites warrant some level of cybersecurity scrutiny. Spend some time during Cybersecurity Awareness Month thinking about what you need to do to make yourself less vulnerable to attack as you use the Internet. Passwords Changing passwords and making sure that you don’t use the same […]

Filed Under: Trust Guard Tagged With: cyber attacks, cyber-security, data security, hackers, online business, passwords, vulnerabilities

Acer Data Breach: 34,500 Shoppers Affected

October 7, 2016 By James Wales Leave a Comment

Acer Data Breach: 34,500 Shoppers Affected

The shocking Acer data breach was caused by the company “inadvertently” storing consumer data in an unsecured format. The Acer data breach compromised the information of nearly 34,500 Acer online shoppers. This is what the company reportedly told PCWorld only days after Yahoo! announced the security breach of millions of records in 2014. As a result, a hacker […]

Filed Under: News Tagged With: cyber-security, data breach, data security, hackers, identity theft, vulnerabilities

Is Your Mobile App Hack Proof – Part Two

September 26, 2016 By James Wales Leave a Comment

Is Your Mobile App Hack Proof – Part Two

In Part One of this article we discussed the first category of potential binary risks associated with hack proof mobile apps. A hack exposes a company to significant economic, legal and reputational risks. The impact of not having a hack proof app can be devastating and all-encompassing. I know it’s difficult as an app developer […]

Filed Under: Commentary Tagged With: binary protection, Binary Risks, cyber-security, hack-proof, hackers, vulnerabilities

Is Your Mobile App Hack Proof? Part One

September 26, 2016 By James Wales Leave a Comment

Is Your Mobile App Hack Proof? Part One

Are you afraid that after everything you’ve done to build your app that it might not be hack proof? A hack can expose a company to serious risks and the negative impact can be devastating. Imagine having your mobile health app reprogrammed to instruct you to deliver a lethal dose of medication. If it isn’t hack […]

Filed Under: Commentary Tagged With: binary protection, Binary Risks, cyber-security, hack-proof, hackers, mobile app security, vulnerabilities

New Ransomware Could Post Your Personal Data Online

September 12, 2016 By James Wales Leave a Comment

New Ransomware Could Post Your Personal Data Online

A new strain of ransomware called “Cry” encrypts data with its .cryextension. It harvests your location data from Google Maps and pasting it as an image onto imgur.com. A lot of ransomware variants simply send the victim’s information directly to the attacker’s Command and Control (C&C) servers. Cry, however, uses Portable Network Graphic (PNG) image […]

Filed Under: News, Trust Guard Tagged With: cyber-security, data security, hackers, malware, ransomware, vulnerabilities

  • « Previous Page
  • 1
  • 2
  • 3
  • Next Page »

Popular

PCI Compliance: What You Need to Know to Protect Your Business

PCI Compliance: What You Need to Know to Protect Your Business

4 Business Lessons from the Game of Thrones

4 Business Lessons from the Game of Thrones

Do Your Home Appliances Collect Personal Data?

Do Your Home Appliances Collect Personal Data?

What Potatoes Can Teach Us About Security

What Potatoes Can Teach Us About Security

Categories

  • Commentary
  • emailpromo
  • Features
  • News
  • Popular
  • Trust Guard

About · Contact Us · Get Started
Copyright © 2022 · Trust Guard