Information Security
We analyzed the impact of data breaches on share prices. Here's what we found.
By Paul Bischoff in Blog on June 5, 2024
A data exposure of 7 million Adobe Creative Cloud account records could put users at risk of targeted phishing.
By Paul Bischoff in Information Security on January 3, 2020
Want to make sure your business is fully protected, including online? If you want to save yourself money in the event of a breach you might need cyber insurance for your business. Find out why it’s important and how to get yourself covered.
By Aimee O'Driscoll in Information Security on August 2, 2023
Many organizations argue they protect privacy through the use of aggregate, de-identified or anonymous data, but how many users understand these terms? We explain how these different techniques work and whether or not your privacy is actually protected.
By Victoria McIntosh in Information Security on September 25, 2023
Federated learning is a new approach for training the algorithms we use every day. But what actually is federated learning and is it really more private? We explain everything you should know about this new algorithm model. 
By Josh Lake in Information Security on October 25, 2019
Will Google Stadia and other cloud-based video game streaming services put an end to video game piracy? These new services have gaming pirates talking, but a complete disruption in the piracy market may still be years away.
By Sam Cook in Information Security on April 16, 2022
Ultrasonic tracking is used in various applications on mobile and other devices, sometimes without the user’s knowledge. Find out more about how to block ultrasonic tracking and what it means for your privacy.
By Aimee O'Driscoll in Information Security on January 19, 2023
Scholarship scams take advantage of students looking to help fund their education. We reveal how to spot and avoid common scholarship scams, as well as what to do if you've been caught out by one.
By Aimee O'Driscoll in Information Security on December 21, 2023
The personal information of hundreds of thousands on CenturyLink customers, including name, addresses, email addresses, and phone numbers was exposed online.
By Paul Bischoff in Information Security on October 18, 2019
Page 33 of 51