Top 10 digital privacy happenings of June

As some of you may know, every week I’ve been collecting digital privacy happenings on my blog that represent what caught my attention in the privacy world. News, tweets, projects, videos, and anything that involves a change for better or worse in our privacy as digital citizens. As a wrap up for each month, I’ll collect a “Top […]

Read More

Keeping an Accurate Data Trail: How Important is Log Management in Information Security?

Security is a very important aspect of any business. Each day, organizations deal with huge amounts of sensitive and critical data. Loss of corporate data due to data breaches can have a significant negative impact on businesses. In order to protect their sensitive data, organizations invest in many security technologies like firewalls, intrusion detection and prevention […]

Read More

Why Small Businesses Are Lucrative Targets for Cyber Criminals and How to Protect Yours

A few years back, business owners were under the impression that only big and well-known companies were at risk of cyber attacks. As big organizations handle enormous amounts of data and are highly interconnected, a data breach could have a significant negative impact on the economy. However, with the advancement in technology and the advent of cloud […]

Read More

Usability challenges on privacy-preserving systems (Part 4): sharing data

A system that protects data just for you can be considered easy to design and develop. By for you I mean that the only path the data traverses is from your device to a server and back to you. A really interesting problem appears when somebody says that the system should have a sharing feature. How else would […]

Read More

The Importance of Secure Data Backup: Protecting Your Small Business from Big Risks

  It does not matter whether you are a small or large business- data is a vital part of any enterprise. Losing corporate data can cost businesses millions of dollars. Today, a large majority of companies are relying on online data backups to protect their valuable information from being damaged, stolen, or affected by natural disasters like fire or […]

Read More

The Social Media Privacy Trap: Facebook to Collect More User Data for Advertising

There is no escape from online advertising in today’s Internet age. Advertisers earn a lot of revenue by placing their ads on popular websites like Facebook and YouTube. These outlets provide a platform to showcase products and services to an extensive audience. Social networking websites have the ability to track your interests and likings based on your […]

Read More

We need your help! What videos do you want to see from SpiderOak?

We’d like to invite you to share your ideas with us. How can our blog and YouTube channel enhance your SpiderOak experience? What topics would you like us to cover? Tutorials ? Cute cats dancing? Tech nerds rapping? The SpiderOak team is excited to generate more content geared toward connecting with our users. We plan to […]

Read More

Wearable Technologies: New Security Risks that Arise With Innovative Trends

Over the years, technology has evolved at an exponential rate, from desktops to laptops to tablets, and now wearable devices. Wearable technology is currently one of the fastest growing trends. With these devices, connection to the Internet is taken to an all new level. Companies are putting millions of dollars to build the next innovative and technically […]

Read More

Identify Critical Assets and Maintain Clear Communication to Reduce the Impact of Data Breaches

Cloud computing has become an integral part of today’s IT market; however, the security of data in the cloud has always remained in question. Organizations tend to outsource almost 50% of their resources to cloud-based services because of their flexibility and cost effectiveness. Since huge amounts of corporate data rest in the cloud, they have […]

Read More

Cryptowall Ransomware Spreading through Malicious Advertisements

As predicted by security researchers, 2014 is really turning out to be the year for new forms of ransomware attacks. Ransomware is a form of malware that takes over your system and restricts access to your files and folders until you pay the ransom amount to the malware author. Without the knowledge of the victim, the malware […]

Read More