Halloween Safety Tips

Halloween Safety Tips

by Alice Coles, Motion Graphics Designer

Halloween is finally here, and kids everywhere are knocking on door after door, showing off their costumes, and asking for candy. Now, most of us know that the easiest way to be the best Halloween home on the block is to shell out for full-sized candy bars, there are some other things you can do to the safest one, too! It’s important to protect the safety both of your home, and the trick or treaters who are visiting it, so we’ve compiled some Halloween safety tips for you to remember tonight! (more…)

Cyber Security Part 3 – Personal Cyber Security Practices

Cyber Security Part 3 – Personal Cyber Security Practices

October is Cyber Security month, so Bold Perennial is taking the opportunity to provide our customers with information on how to protect yourself and your business from cyber attacks. Every year, thousands of companies fall prey to attacks on their network and equipment, from small businesses to large corporations. In this three-part series, we’ve so far discussed the different types of cyber threats and outlined specific cybersecurity practices for the workplace. We wrap up this week with some tips on personal cyber security. (more…)

Cyber Security Part 2 – Cyber Security Threats in the Workplace

Cyber Security Part 2 – Cyber Security Threats in the Workplace

Every year, thousands of companies fall prey to attacks on their network and equipment. No one is immune; from small businesses to large corporations like Home Depot and Sony, cyber security threats must be taken seriously.

As the Internet of Things, cloud platforms, offsite storage, and other technologies gain in popularity, their susceptibility as a security breach point does, too. All companies should have risk management strategies and a strong cyber security culture in place. As part of Cyber Security Month, we are presenting this three-part series to offer tips for protecting yourself against cyber security threats in the workplace, the home, and on personal devices. In our first segment, we discussed the types of cyber threats and various ways to defend against them. This week, we’ll look specifically at the workplace, and steps to protect your business. (more…)

Cyber Security Part 1 – What are the Threats?

Cyber Security Part 1 – What are the Threats?

October is Cyber Security month, so Bold Perennial is taking the opportunity to provide our customers with information on how to protect yourself and your business from cyber attacks. Every year, thousands of companies fall prey to attacks on their network and equipment. No one is immune; small businesses, large corporations like Target and Anthem, even one of the largest credit bureaus in the United States, Equifax, have all been hit by devastating cyber attacks. Cyber security threats are a problem which must be taken seriously. (more…)

The Scoop on Skimmers

The Scoop on Skimmers

You probably don’t think much about credit card fraud while you are filling up your car with gas. Yet ironically, it’s one of the times where your credit card is most at risk. Because over 37 million people refuel their vehicle every day, gas pumps are a prime target for credit card skimmers, discreet devices inserted into the card readers to “skim” the information for thieves while the transaction takes place. And a single pump with a skimmer attached can net the criminal anywhere from 30 to 100 card numbers per day.

So how do you spot credit card skimmers? It’s not easy to do, but here are some signs to watch for: (more…)

Top Application Security Threats

Top Application Security Threats

by guest blogger, Katherine Palac, Director of Marketing, Column Information Security

Technology moves so fast these days, companies can be forgiven somewhat for doing all they can to keep up with it. This is especially important in the world of apps, where being the first to market can be critical for success. However, businesses that rush through the development process may find themselves not only first to mobile devices, but also to be hacked. In their haste to be ahead of the competition, they might overlook certain crucial security risks. By releasing their products with serious flaws, they make themselves and their customers vulnerable to cyber-attacks. (more…)