What is Cyber Insurance and Who is Getting It? By Zach Lewis December 8, 2021 Your personal information winds up online for a myriad of reasons. Certain social media sites allow you to post all sorts of information about yourself. Most online businesses collect and...
How to Detect Data Leakage By Megha Patel October 20, 2021 With an increase in remote work and internet activity, data leakages have never been more common than in this past year. Online data is frequently at risk of being used to cause personal, financial, and...
How Valuable Is Your Data? By Quan Nguyen September 22, 2021 As our lives increasingly integrate with the internet, the risks of exposing our personal data also rises. Most of your online interactions such as clicks, purchases, and social media likes are valued in the...
Defining Hashing and Encryption By Helena Miller September 15, 2021 Hashing and encryption are two common methods that are imposed to enhance digital privacy. It is necessary that enterprise users understand the purposes, functions, capabilities, and limitations of...
A Guide to Privacy Policies for Minors By Tanunnut Suebsang September 8, 2021 Technological advances have brought about detailed privacy policies. Over the years, privacy policies have been used to ensure company transparency about their data collection. Data...
Malicious Life and humanID: A Better Internet By Evan Walters-Zucco July 12, 2021 The internet is plagued by data collection, data leaks, bots, hacking, and disinformation. Large corporations, such as Google, Facebook, Apple, Amazon, and Microsoft, collect and...