Public Wi-Fi—To Browse or Not To Browse: We’ll Answer the Question

By Karen Mesoznik, SaferVPN

What You Should Know About Public Wi-Fi

Usually when you’re preparing for an upcoming trip, your mind runs through the usual concerns and questions: “What vaccinations do I need?” “Is my passport up-to-date?” “What do I need to keep my cash and cards safe?” But if there’s one more travel habit you should have, or precaution you should take, it’s staying safe over public Wi-Fi.

Today, public Wi-Fi at airports, hotels and cafes, is a lot like water at a restaurant – it’s an expectation, not a gift, a commodity, not a luxury. But what if the restaurant you went to poured you a glass of unclean water? Water that ended up making you very, very sick?

Think of unsecured public Wi-Fi as tainted water waiting to pollute your personal data, internet privacy and online identity. Continue reading

Advertisements

Why don’t more businesses encrypt their emails?

Businesses rarely encrypt their email messages because good encryption is too hard to use.  That’s changing.

By Randy Battat, PreVeil

Most business-to-business communication involves sensitive information – stuff that the parties really don’t want others to know about. Whether it’s contracts, customer communications, supplier information, dialog with consultants and contractors, or other things, there’s a lot of sensitive information that travels via plain old email.

These emails really should be protected, i.e. encrypted. But the vast majority of B2B communication remains unencrypted, despite wide availability of very good technology and tools. Why? Continue reading

What is phishing and spear phishing?

One of the most basic practices every cybersecurity guide will recommend is not to click on links and attachments contained in emails coming from unknown sources, and to think twice even if they come from seemingly trustworthy sources.

You think it’s unnecessary caution? Ask John Podesta, chairman of Hillary Clinton’s presidential elections campaign. This is exactly how he (or the operator of his email account) gave away his accounts credentials to hackers. The breach led to a series of damaging and embarrassing leaks which might have cost his boss her chance of becoming president. Continue reading