Social media has fundamentally changed how we communicate and stay connected to the people we care about. It has been an excellent tool for collaboration and expressing ideas around the world. These aspects of social media have been amazing but have also left many open to a serious intrusion of privacy. Protecting your personal information on social media has never been more important. In this blog, we will discuss the best ways to stay safe while using social media.
Michael McLafferty

Recent Posts
How to Protect Your Privacy on Social Media Sites
Topics: Cyber-Security, Data Privacy, Social Media, Privacy
The “phishing” industry is a booming goldmine for hackers. More unsuspecting victims fall prey every hour to phishing campaigns, than any other type of cyber-attack. It is an epidemic of sorts, plaguing the digital world.
Topics: technology, Cyber-Security, Data Privacy, Phishing, Internet, Internet Safety
The way our society exchanges good and services has come a long way. The age of the “digital consumer” has dawned. More people than ever are shopping online and making purchases using credit cards. Nearly every business existing in the modern age had to adapt to take credit cards payments. This created several issues for both merchants and consumers. Identity theft and data breaches started to become a rampant issue in the late 90s and early 00s. It has continued to be a serious and increasing concern to authorities. More than 510 million records with sensitive information have been breached since January 2005(source: https://www.pcisecuritystandards.org). These issues were exacerbated by a lack of cohesion among the credit card providers. They had no agreement upon standards, as to how the transaction process should occur and how sensitive financial data is stored. To maintain consumer confidence, action had to be taken. On September 7th, 2006, the credit card providers decided to hold a meeting on how to best protect the cardholder. The outcome of that meeting would create the Payment Card Industry Security Standards Council. The council is made of up five members, Visa, Mastercard, American Express, Discover, and JCB. The objective of the council is to oversee the continuing development of the Payment Card Industry Data Security Standard (PCI-DSS).
Topics: PCI Compliant, Data, Data Privacy, PCI-DSS, PCI Compliance
We live in a rapidly changing world. Constant breakthroughs in new technologies are occurring at a fantastical pace. This has led to many wonderful improvements in our society but has also come with unexpected conundrums. Advances in data collection methods have completely transformed our commercial sectors, by allowing the consumer to be studied and observed in real-time. As the consumer interacts with the product or service, data is collected. It is then sent to manufactures and marketing firms for research analysis. Data collection has also impacted our society on various social media platforms and created serious ethical dilemmas. Mass data collection can be a positive contributing factor to the improvement of many emerging technologies but must be applied ethically. Another factor to consider, is how the data is being stored and who can access it. Over time (and many data breaches later), it was decided a standardized set of rules for data collection and storage was needed. What evolved was the General Data Protection Regulation.
Topics: technology, GDPR, Cyber-Security, Data, Data Privacy
Human beings have always sought out ways to communicate more efficiently. Our society has come a long way since the days of the telegraph and radio. Never have we been more inter-connected with our ability to communicate and collect data than we are now. New advances in technology has given us an unprecedented look, into how our industries and commercial sectors operate. The consumer can now be studied with precise observation in real-time. The arrival of the Internet of Things (IoT) has ushered in a new age of mass communication and data collection. First, let us discuss what IoT is and how it is applied in the real world. Simply put, the Internet of Things is a network of Internet connected objects able to collect and exchange data. Kevin Ashton of MIT was the first to mention the Internet of Things in 1999. His goal was to bring radio frequency ID (RFID) to the leaders of P&G. IoT has evolved tremendously since then. It is important to understand how versatile IoT can be. A “thing” in IoT can be a medical device (pacemaker) monitoring vital statistics, a built-in sensor to monitor tire pressure, or a smart thermostat to keep server rooms at acceptable temperatures, and commonly used household devices, such as Nest, Ring doorbell, and Roku boxes. All these examples collect and send data back to the manufacturer. Data is also sent to third-party analytical centers for both marketing and research. IoT is generally subcategorized by device, into three distinct groups: information technology, operational technology, and smart objects.
Topics: technology, IoT, Cyber-Security