Everybody loves email

emailFrom grans and granddads to high flying executives, seasoned IT veterans and thrusting entrepreneurs – everybody loves email so much they don’t even think twice about it. It just is. Hackers love it too because it can be a key to a company’s digital front door – and let your corporate guard down and they’ll be in quicker than you can say Trojan.

Read more


Digital Mission Creep

privacyThe UK’s National Health Service is set to launch a sweeping scheme designed to promote better healthcare and greater efficiencies. To be successful it requires the collating of patient data in a centralised database. But critics point out that private medical records could be exposed to all and everybody. The argument illustrates how the notion of privacy is being rapidly eroded in the digital age.

Read more


Facebook Privacy Checkup

Facebook PrivacyEarlier this month, Facebook launched their “Privacy Checkup Tool” which enables you to easily review what you’re sharing, and with whom.

If you’re a regular reader of the BullGuard blog (if you’re not, you should be – sign up here!), you’ll know that with so many frequent privacy updates on Facebook, it can be hard to stay on top of these updates and how it could impact you and your account.

Read more


A plague on your Apple

Facebook Scam PageIn the wake of the Apple iPhone 6 launch, scammers, skansters and fraudsters have been busy setting up Apple themed social network pages, fraudulent competitions and SMS and email phishing campaigns, in order to get their hands on your sensitive information. Here are some tips to guard against their tricks.

Read more


Bluetooth-enabled Skimming Devices

Bluetooth-enabled Skimming DevicesIf you haven’t heard of Bluetooth-enabled skimming devices before, you definitely need to read this article. These devices are being used to steal card information. A recent scam resulted in cyber criminals making off with more than $2 million.

Skimming devices are typically installed inside gas pumps or fixed to ATM’s so that they aren’t detectable by the victims using the machines. By installing Bluetooth-enabled skimming devices, the cyber criminals are making their lives easier – the devices never have to be physically removed, because all of the data can be accessed remotely.
Read more


The Millennial’s Guide to Protecting Your Identity

The Millennial's Guide to Protecting Your IdentityGuest writer: Terry Royal

Terry is a former medical assistant-turned-certified life coach who writes about health, wellness and the power of positive thinking.

How would you feel if you went to the grocery store and found out at the checkout line that you had no money in your bank account? Normally this is embarrassing enough, but what if you knew that you should have money in the account?

Read more


Remote Support Tools – not without Complications

Remote Support ToolsAs employees acquire more and more remote devices, such as laptops, tablets and mobile phones, it becomes increasingly more difficult for companies to protect the devices and the valuable data stored within each one. A recent study showed that companies are often still unprepared when it comes to security breaches and providing their employees with remote support technology.

 

Read more