New laptop/computer cyber threat protection checklist

Ensure to complete this checklist before you use or start surfing the Internet on your new computer/laptop. The checklist applies to most scenarios. But you can post a comment if you have a specific need or question. The checklist is provided under the CDSBureau Information Use Policy. You agree to this policy if you read Read more about New laptop/computer cyber threat protection checklist[…]

Hackers Use Phony WiFi to Steal Company Data

Hackers are using phony WiFi networks to hack into employee or guest computers¬† to steal sensitive information. Hackers go to a company location that they want to hack and setup their phony WiFi network with a name that matches any existing company WiFis. An unaware employee or company guest mistakenly joins the phony WiFi network Read more about Hackers Use Phony WiFi to Steal Company Data[…]

CDSBureau Recommended Practices: Protecting Business/Family Assets from Malicious Emails

A CDSBureau Recommended Practice Series. Email is one of the major ways Cyber crooks use to get into your business or home computers/network. Simple looking emails can carry malicious code, attachments, or links that can spread virus, auto bots, malicious programs.¬† Although companies or public email providers put very good filters yet Cyber crooks are Read more about CDSBureau Recommended Practices: Protecting Business/Family Assets from Malicious Emails[…]

How to handle your customer or employee’s confidential data?

An organization that handles customer or employee confidential data must protect all stages of confidential data life cycle. Data theft can happen at any stage of the life cycle. The following are the various data life cycle stages. Data gathering Data transmission Data storage Data purge 1. Data gathering: Organization gathers data through physical forms Read more about How to handle your customer or employee’s confidential data?[…]