Security Cloud Privacy Tech

Posts

All posts on markn.ca covering cloud, security, privacy, and technology.

50 Million Facebook Accounts Hacked?!?

50 million Facebook accounts were hacked. Facebook responded quickly to the issue but could’ve done better communicating throughout. Here’s what you need to know about the hack.

Facebook, Shadow Profiles, & Data Brokers

A recent study proved that Facebook uses more information about you than you realize. Behind the scenes, Facebook compiles “shadow profiles” from various sources in order to better target ads…anyone surprised?

End-to-end Encryption & WhatsApp

In the recent dust up with the founders of WhatsApp, you might have heard the term “end-to-end encryption”. What is it? What does it means for you? Why was it frustrating efforts to data mine and monetize WhatsApp?

Amazon Alexa Everywhere

Amazon announced a host of new “Alexa enabled” devices last week. What are the implications for your privacy at home?

What Do You Look To Get Out Of Conferences?

Conferences are usually jam packed with great content. So much so that it can be hard to prepare for them and get the most out of them. What do you look for in a conference? How can I help?

Security Is A Quality Issue

Security is a quality issue. Except we don’t treat it that way and that’s costing us dearly.

The Basic Basics

With the initial set of cybersecurity basics segments done, I’m think it’s worth moving to a “basics” basics series. The goal would be to help everyone understand how the internet works, how email is structure, etc. Thoughts?

Cybersecurity Basics #12 – Bolt-on vs Built-in

Built-in security is always best. That’s “security by design” but when that fails (due to mistakes, oversight, humans), built-in security steps up…or, um, in.

Cybersecurity Basics #11a – Risk Assessments Redux

In your personal life you’re assessing risk constantly whether you know it or not. In the digital world the same thing happens BUT you probably don’t have the required context to make an informed decision.

Cybersecurity Basics #11 – Risk Assessments & Pen Tests

Risk assessments are useful when kept in context and continually updated. A penetration test (or pen test) is when your system undergoes a “friendly” attack with the idea of find issues before cybercriminals do. Together they are a strong...

Cybersecurity Basics #10 – Personally Identifiable Information

Personally identifiable information (PII) and Personal Health Information (PHI) are critical concepts. They help identify information that needs additional safeguards and care.

Family Locator Apps

Should you track your children’s every move? Your partners? Family locator apps promise safety and convenience but are they really just an invasion of privacy?

« Previous Page
 
Next Page »