Let's Talk
Welcome to the Cygilant Blog

Avoiding Cybersecurity Hoaxes: How to Tell What's Legitimate

Posted by Shawn O'Brien on Apr 26, 2016

 

In 2016, there has been an influx of satirical stories and hoax videos surrounding cybersecurity, due to the widespread news coverage on the FBI vs. Apple case. Given how many people have fallen for these deceptive stories—and continue to be tricked by scam phishing emails—the necessity of cybersecurity education is more crucial now than ever. Here are a few useful tips on how to avoid misleading websites and fake information.

3 Security Tools to Protect Your Financial Data

Posted by Vijay Basani on Feb 16, 2016

 

With big hacks making headlines seemingly every week, users and businesses alike understand the need to protect their financial data from digital compromises. Here are three online tools that can help safeguard sensitive financial information.

HTTPS Everywhere

There are two categories of web traffic, and only one is safe for financial data. The first and most common type is information traveling over HTTP (HyperText Transfer Protocol), which is the backbone of the web. Data sent via HTTP is not encrypted—it can be read by anyone who intercepts it, such as the staff at a user's ISP. The other type of web traffic is information moving over HTTPS, which stands for HTTP Secure. Unlike information transmitted via HTTP, this data is encrypted, which makes it safer to send financial details. When users sign into their bank accounts, for example, browsers default to HTTPS and display a padlock to indicate an encrypted connection.

How Clearing Your Cache Can Save You Cash

Posted by Security Steve on Jan 18, 2016

 

When users browse online, they often forget to clear the data from their web browser cache. However, this means that browsers can locally save sensitive website information such as bank account numbers and email passwords. If there is no company practice in place for staff to perform basic security measures like clearing their cache, malware can enter their systems, find private data, and send it to hackers, leading to dire consequences for companies.

How Browser Caches Store Web Data

A cache is a repository of stored data that is used to speed up the process of retrieving data. If a user accessing a resource already has some of its data stored in a cache, then the user does not need to retrieve that data from the resource—he or she can simply use it from the cache. But if the cache is empty, he or she must obtain all of it from the resource, which can be time-consuming.

Subscribe to Email Updates

How Much Could You Save?

Find out now with our
60-second ROI calculator!

Calculate!

Posts by Topic

See All