Read WhatsApp's Fake News Problem Has Turned Deadly in India. Here's How to Stop It.

By CIARA NUGENT, TIME Magazine.  Published August 1, 2018.

While WhatsApp tackles the problem of bad content going viral, GTB tackles the need for companies to communicate with their customers.  With our mobile app, Accession Communicator, employees connect with each other and customers as if they’re in the office from virtually anywhere at anytime.  The app connects the office line to nearly any kind of mobile device, allowing staff to talk, message and video chat.  Learn more.  

Click here or call 1 (877) CALL-GTB to see how Accession Communicator can help you.

 

Related Articles: Smartphones Are Changing The Way We Work (Infographic), Mobile Apps - Difference between Native, Web and Hybrid Apps, and Difference between a Softphone, Hardphone and Smartphone.

Read A CLEVER ANDROID HACK TAKES ADVANTAGE OF SLOPPY STORAGE.

By ublished Auguest 12, 2018. 

While Google addresses how developers use external storage, GTB can help you safeguard your company against malware and other cyber threats.  As part of our CyberSeal Security Solutions package, we provide Internet Security Firewall, Anti-Virus and Malware Protection software and more!  

Click here or call 1 (877) CALL-GTB to redeem your free cyber security assessment

 

Related Articles: Cyber Security: Traditional vs. Next Generation FirewallHow to Protect Your Company Against Cyber Attacks and Ransomware: What Is It and How to Reduce the Risk for Infection?

Read Cybersecurity: Time for a Paradigm Shift.

By Morgan Stanley Blue Papers: Research Division 

Trying to protect your company from cyber threats?  GTB can help.  As part of our CyberSeal Security Solutions package, we provide Internet Security Firewall, Anti-Virus and Malware Protection software and Cloud Backup.  Learn more.

Click here or call 1 (877) CALL-GTB to redeem your free assessment

 

Related Articles: Cyber Security: Traditional vs. Next Generation FirewallHow to Protect Your Company Against Cyber Attacks and Ransomware: What Is It and How to Reduce the Risk for Infection?

by Hogan Injury

Cybercrime has cost victims $126 billion worldwide and it has indeed established itself as a criminal enterprise. Every day, we see headlines on security and data breaches, invasion of privacy, and hacking. Cybercriminals continue to innovate new ways to attack and both private and public sectors remain vulnerable.

Studies have shown that millennials – those who are born between 1982 and 2004 – are among the top victims of cybercrimes. According to a 2016 report by Norton Cyber Security, 40% of millennials have fallen victim to cybercrime in the past year. Eighty-six percent of those surveyed said that they might have experienced a phishing incident, with 30 percent unable to detect a phishing attack.

Millennials are digital natives, and they are undeniably more tech-savvy than the previous generations, so why would they be the most vulnerable to cybercrimes? Despite being the more tech-savvy set, it is worth noting that millennials experienced two different eras of technological developments. Witnessing the internet from its early stages – the slow connection and the huge computers – to the accelerated rise of social media, smart phones, and wireless connection must have made them a bit cavalier when it comes to their online activities.

True enough, reports blame unsafe online practices for this problem.  Millennials can be promiscuous when it comes to their login credentials; they tend to share their passwords to friends and family members. This lack of caution, paired with the use of vulnerable media online, spells security trouble. Another reason is their use of public and unsecured wi-fi networks for online transactions, resulting in sensitive information and credentials to become vulnerable. Most millennials are also lax in terms of using third-party applications, answering online surveys, and providing access to files and documents in online platforms.

How do you protect yourself from cybercrimes?

  • Make it very difficult for attackers to access your accounts by using strong and unique passwords. Make sure to use lower and upper case letters, symbols, and numbers. Change your passwords every three months, and do not use just one password for all your accounts.
  • When installing new network-connected devices at home, do not forget to change the default password. Disable or protect remote access when not necessary.
  • Be cautious and think twice before clicking links and opening messages and attachments. Be suspicious of the sender and the subject line. Most phishing emails come from compromised email accounts of friends. Surveys show that 4 in 10 millennials cannot distinguish between a phishing email from a legitimate one.
  • Limit your online activities when using public wi-fi networks. When you access your personal information using an unsecured public wi-fi, you risk exposing them. Avoid accessing your social media accounts, paying bills and purchasing anything using your credit card while on a public wi-fi network.
  • Be diligent in managing the settings of your social media sites. Make sure that you are not exposing personal and private information. The less you share, the better.
  • Stay updated on news about security breaches. If your bank or a site you have an account on falls victim to cybercriminals, change your password immediately.
  • If you have become a victim of a cyber attack, alert your local police. In some cases, the FBI and the Federal Trade Commission need to be looped in, too. By reporting the crime, however minor it may seem, you are helping prevent criminals from proliferating.

Trying to protect your company from cyber threats?  GTB can help.  As part of our CyberSeal Security Solutions package, we provide Internet Security Firewall, Anti-Virus and Malware Protection software and Cloud Backup.  Learn more.

Click here or call 1 (877) CALL-GTB to redeem your free cyber security assessment

 

Related Articles: How to Protect Your Company Against Cyber AttacksCyber Security: Traditional vs. Next Generation Firewall and Ransomware: What It Is and How to Reduce the Risk for Infection