datumconsulting blog

 

Do you hate remembering passwords? Soon, you may be able to forget them for good.

For years, we’ve relied on a secret we share with a computer to prove we are who we say we are. But passwords are easily compromised through a phishing sca...

The newest generation of wireless connectivity has been a major topic of discussion in 2020; WiFi 6 and 5G are being touted in marketing pitches for consumer and enterprise products alike. But what really makes these newest generations sp...

At the RSA security conference the last week of February, Microsoft engineers said that 99.9% of the compromised accounts they track every month don’t use multi-factor authentication, a solution that stops most automated account attac...

Proactive cybersecurity is critical to ensure that an organization’s devices and data are protected from the wide array of threats that are growing by the day. Since 2013 there are approximately 3,809,448 records stolen from breaches ever...

Bluetooth is used in everything from speakers to implanted pacemakers, which means that Bluetooth-related vulnerabilities can affect a dizzying array of devices. In the latest instance, a newly discovered round of 12 Bluetooth bugs pote...

Cybercrime is evolving. Do you remember back when our biggest fear was that our computer would get a virus? Fast forward ten years later, and that’s the least of our concerns. Today, there are trillions of cybercriminals out there that ha...