datumconsulting blog

 

In recent years, communications services ranging from WhatsApp to Zoom have announced their implementation of end-to-end encryption. What does that mean? Well, the idea of encryption is pretty straightforward: It turns data into something...

By Taylor Gadsden, Staff Writer at Allconnect

Since the spread of COVID-19, people have been eager to understand what’s taking place during the pandemic, how to better protect themselves and what the future holds. However, with multiple...

By PasswordManager.com

According to the FBI’s 2019 Internet Crime Report, the FBI’s Internet Crime Complaint Center received over 467,000 complaints of internet-related scams in 2019. Altogether, these internet crimes cost victims ov...

When it comes to maintaining security in an organization, Midsize Enterprises (MSEs)* are faced with complex challenges such as limited budgets and technical staff. Multifactor authentication is becoming a universal standard, but how can...

We talk a lot about safe passwords here. But something we’ve never covered is why a safe password is safe. We’ll talk about the most common techniques used by password hackers and why using long, strong, and frequently changed passphrases...

Your personal information is valuable. That’s why hackers try to steal it. We’ve got tips to help you keep your personal information from ending up in the hands of a hacker.