This message was sent to ##Email##
|
|
|
Reuters via U.S. News & World Report
U.S. Senate Democrats launched efforts to win a vote to reinstate Obama-era rules guaranteeing an open internet, suggesting it would be a major issue in the 2018 mid-term elections.
Democrats remain one Republican senator shy of winning a majority in the Senate to reverse the Federal Communications Commission's order to undo the 2015 open internet rules.
Even then the effort would not likely pass the Republican-controlled House of Representatives or survive a veto by President Donald Trump.
READ MORE
CIS
ATM skimmers are devices that criminals place over or on ATM machines to steal your card information, including your personal identification number (PIN). While the tricks used by these thieves can be complicated, there are a handful of simple methods to properly protect your financial information.
Choose ATMs Wisely
Look for ones that are within bank perimeters, well lighted, and/or on busy streets. If possible, try to always use the same ATM, since it will be easier to identify abnormalities.
Hide Your PIN
Even though you may be alone, that doesn't mean you are not being watched. Modern day skimmers now also hide little cameras to register you inputting your PIN. If you take the simple precaution of covering your hand while inputting your information, you'll help prevent the criminal from getting this information.
Look for Abnormalities
Most skimmers have to attach their skimming machine over the real ATM using simple adhesives since they often have to quickly remove the device. Check the machine to see if the input device wobbles or seems unattached. If it is, use another machine. Also look for out-of-place cameras and keypad overlays that can capture your PIN.
Report the Abnormalities
If your card is not returned after the transaction or after hitting "cancel," immediately contact the financial institution that issued the card.
Check Your Accounts Regularly
To decrease the chances of cyber-criminals running away with all your money, check your accounts regularly and immediately follow up on any suspicious activities.
 |
|
With industry-leading components from Cisco and Pure Storage, FlashStack is a powerful, efficient, and evergreen converged infrastructure solution that will shorten your time to value and deliver serious ROI. It scales, without disruption, as your needs grow and provides a powerful and reliable platform. Watch the video to learn more!
|
|
|
Unlike ordinary managed service providers, backup and disaster recovery is all we do.
We even write, test and maintain your DR plan while keeping costs predictable.
There’s a reason the majority of ThinkGard’s customers are public sector agencies.
Perhaps you should find out why.
Visit our website! See Case Study.
|
|
|
|
|
Personalized, Connected, Secure Cloud
A modern cloud platform. What if your cloud was truly personalized to your business? What if it seamlessly connected your entire organization from anywhere and from any device? What if you were confident that your cloud data was more secure than ever? It can be with Oracle’s modern cloud.
Read more
|
|
|
|
|
Computer World
Blockchain is quickly making inroads across a variety of industries.
That's mainly because of its innate security and its potential for improving systems operations all while reducing costs and creating new revenue streams. David Schatsky, a managing director at consultancy Deloitte LLP, believes blockchain's diversity speaks to its versatility in addressing business needs, but "the impact that blockchain will have on businesses in various industries is not yet fully understood."
READ MORE
WRAL-TV
There may be gold medals hanging around American necks, but the most impressive thing coming out of the Pyeongchang Games is the super cool technology straight from the future. Here are the three pieces of Olympics tech with the biggest wow factors.
READ MORE
The Hill
As electronic payments become more secure, criminals must be just as innovative as they seek to steal identities and commit fraud. In the case of synthetic identity theft — one of the fastest-growing and most prevalent forms of identity theft, with annual losses to the credit card industry estimated at $8 billion — criminals need to be patient, as well as clever.
READ MORE
By Scott E. Rupp
Healthcare data breaches continued to rise in 2017, but the number of affected patient records declined 80 percent, a new report suggests. According to the Protenus Breach Barometer, 2017 may have simply been an off year for malicious actors, who may be regrouping for more attacks in 2018. A total of 477 data breaches were reported during the year, up from the 450 reported in 2016. However, the positive news is that fewer records were implicated in the breaches.
READ MORE

CSO
Bitcoin, the General Data Protection Regulation in Europe and the internet of things are just three recent developments that will present security professionals with new challenges in 2018. That’s in addition to the usual raft of malware, DDoS attacks and database thefts that have dominated the headlines for some time.
READ MORE
CNNMoney
The Federal Communications Commission's repeal of net neutrality is scheduled to take effect on April 23, according to a copy of the order was published with the Federal Register on Feb. 22. The Republican-led FCC voted along party lines in December to repeal Obama-era net neutrality protections, which were intended to keep the internet open and fair.
READ MORE
Missed last week's issue? See which articles your colleagues read most.
|
Don't be left behind. Click here to see what else you missed.
|
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|