Datapath Blog

Capital One Data Breach: What You Need to Know

Posted by Datapath on Jul 30, 2019 8:35:22 AM

When did this happen?

Read More

Topics: Security

Malvertising

Posted by Datapath on Jun 24, 2019 9:10:00 AM

Visit any website these days and it’s very likely that you will be viewing ads as well. Sometimes these ads can be tempting, with many offering sales, promotions, or freebies to attract more clicks. Ads on certain websites can even be targeted specifically to you based on past browsing history, making you even more likely to click!

Read More

Topics: Security

Confidential Information Handling

Posted by Datapath on Jun 17, 2019 7:47:05 AM

Confidential, Top Secret, Sensitive, For Internal Use Only
These terms apply to information both hard-copy and electronic that should be handled with care. A lot of times, these designations apply to intellectual property, trade secrets, and security configurations. Listed below are several things to keep in mind when dealing with confidential information.

Shred, Shred, Shred
Someone may hand you documents, or you may print out a file or email containing sensitive information. Make sure that when you are done with it, that you shred-shred-shred these files instead of just placing them in the trash. Things to keep in mind: Leaving printed files in the printer tray, meeting handouts, printed emails.
- Attackers will go through the trash and dumpsters to obtain these sensitive documents.

Read More

Topics: Security

Look Before You Book, or You’ll Cry After You Buy

Posted by Datapath on Jun 14, 2019 8:49:05 AM

If you’re planning a trip soon, there are some things you should consider. For starters, is that dirt cheap flight to Tokyo too good to be true? Probably so, especially when the booking site also offers a boatload of other deals at shocking, unbeatable prices - who does that? A scam artist looking to take your money, that’s who. For this reason, you need to learn how to sniff out these “too good to be true” offers. To help you out, here are some tips:

Read More

Topics: Security

USB Sticks (User Snare Bait)

Posted by Datapath on Jun 13, 2019 1:45:09 PM

Have you ever found a USB Stick/Thumb Drive, or a CD on the ground or in a parking lot? Hopefully you did not put this into your computer.

Read More

Topics: Security

Piggybacking - Courtesy That Could Cost You

Posted by Datapath on Jun 4, 2019 3:56:03 PM

To kids, piggybacking is when someone jumps on your back and you carry them around for a while. In the business world, piggybacking is when you let someone that you do not know enter a door that you just opened.

Read More

Topics: Security

Watch Out For Smishing!

Posted by Datapath on May 31, 2019 8:01:55 AM

What it is….

Read More

Topics: Security

"Google" Yourself

Posted by Datapath on May 30, 2019 1:46:13 PM

With the rise of the digital age, it is difficult (if not impossible) to remain totally anonymous on the internet. Having an online presence and maintaining your social networks can be a wonderful and valuable tool, but sometimes we are unaware of how much personal information can be obtained about us over time.

When was the last time you typed your name or your email address in a web search like Google or Bing? You may be shocked at the results. You may find that old photos of yourself pop up, or an old user account from a forgotten social network or blog that is still associated with your name. You may even want to search for your work email, to make sure it has not been compromised and made available on the internet for the bad guys to find.

By searching and analyzing your online presence often, you can take steps to remove those things you may not want strangers to see. Like that embarrassing photo from college. You know the one I’m talking about.

Read More

Topics: Security

Hovering Over Links

Posted by Datapath on May 29, 2019 2:28:32 PM

How can you tell if an email is safe? Even if you catch red flags in an email, such as typos or poor grammar, an urgent demeanor, or even a spoofed domain, how can you truly decipher the safety of an email?

Read More

Topics: Security

Company Size Doesn't Matter

Posted by Datapath on May 28, 2019 7:55:13 AM

Think hackers are only trying to target large corporations for their cyberattacks? Think again! If you are an employee of a small to medium size business, you may have an even bigger bullseye placed on you by hackers.

Read More

Topics: Security