Stephen regularly writes about technology, business continuity, compliance and project management. He's worked with companies such as Canva.com, EnergyCentral.com, and Citibank.
While most spyware is software-based, concerns are also being raised about hardware-based spyware, which is much more difficult to detect.
Companies hit by data breaches get the headlines, but the affected users get the headaches. Victims should consider these data breach remedial actions.
The new and sometimes arcane GDPR lead generation requirements are forcing changes in the way businesses generate, convert, and retarget leads.
Embedding privacy-by-design principles in the building and design of a business, website, application, product, or tool is a good thing in the long-term.
In protecting online privacy, the actions you take are far more important than any legal framework that could be put in place.
You can create a strong foundation of trust with your visitors and customers by developing and enforcing a privacy-friendly website.
As cyberattacks become more common and more expensive to recover from, companies are considering cybersecurity insurance as part of their defense plan.
Not all cybersecurity risks are created equal. The cybersecurity 80/20 rule means prioritizing resources toward risks that could cause the most damage.
Join Our Newsletter
Learn about the latest security threats, system optimization tricks, and the hottest new technologies in the industry.
Over 1,000,000 fellow IT Pros are already on-board, don't be left out!