blog-logo.png

A BLOG ABOUT CYBER SECURITY

Wombat Security is a leader in security awareness and training. Our blog covers the latest cyber security news, insights, and best practices. We arm infosec professionals with the knowledge and tools they need to improve end-user behaviors and reduce organizational risk.

Identity Theft Protection

Why You Should Celebrate National Clean Out Your Computer Day

Posted by Gretel Egan on Feb 13, 2017 1:57:30 PM

National Clean Out Your Computer Day has been recognized on the second Monday in February since 2000. It’s unlikely you’ll find a Hallmark card for it (though I guess you never know), but you should take some time to embrace the practical — and cybersecurity — benefits to reducing your digital footprint.

Read More »

Infographic: IoT Security Q&A and Checklist

Posted by Gretel Egan on Dec 20, 2016 9:47:45 AM

The Internet of Things (IoT) is a hot topic for consumers and infosec professionals alike. Our experts have commented about the cybersecurity threats that are on the rise due to the proliferation of IoT devices — but that is certainly not halting the adoption and implementation of these products.

This holiday season, as more and more devices are activated and begin accessing personal and corporate data and systems, it's important to understand the implications of installing and using IoT products. The following Q&A and checklist can help you get a better grasp of the different types of IoT devices that are available in the marketplace and the steps you can take to ensure that your personal and business data are kept as secure as possible as you and your family members utilize this burgeoning technology.

Read More »

Security Spotlight: Avoiding Holiday Shopping Scams

Posted by Gretel Egan on Nov 21, 2016 11:44:12 AM

With the 2016 holiday shopping season soon to be in full swing, cybercriminals are working overtime to turn your deal hunt into a score for the bad guys.

Below, we outline a few perennial holiday shopping scams, as well as a couple of newcomers to the scene. Familiarize yourself with the warning signs associated with these hoaxes and our tips for avoiding them. Help make your holidays memorable for the right reasons, not the wrong ones.

Read More »

Three Mobile Security Habits to Implement Today

Posted by Gretel Egan on Oct 19, 2016 2:36:31 PM

In relatively short order, mobile devices have become fixtures in our daily lives. Nothing makes this more clear than the fact that my parents have figured out texting and how to take — and send — a picture with their smartphone. It’s rather amazing to think about what is possible today that wasn’t possible just a few years ago.

But as Uncle Ben Parker of Spider-Man fame cautioned, “With great power comes great responsibility.” (That’s totally who said it. You can look it up.) Our devices help us connect, work, shop, and play — and to enable that, they hold a lot of personal information. Protecting our devices is akin to protecting ourselves.   

It’s time to banish that alter ego who sits on your shoulder and tells you that things like identity theft can’t happen to you. Instead, power up by making the following mobile security tips a part of your cybersecurity arsenal. 

Read More »

Are Other Companies’ Data Breaches Hurting Your Business?

Posted by Gretel Egan on Jun 24, 2016 9:00:00 AM

Breach fatigue is undeniable at this point; data compromises are a daily occurrence, and so-called “mega breaches” aren’t met with the shock and awe that they once were.

But just because data breaches have become old hat doesn’t mean that people aren’t recognizing the risks and reacting to them. In fact, the results of a survey recently released by the National Telecommunications and Information Administration (NTIA) indicate that consumers have been taking notice — and are changing their online habits as a result.

Read More »