Protecting your privacy in the digital age

The threat can range from someone down the street running a small business to a curious former spouse

Protecting your privacy in the digital ageBy Brennen Schmidt ALEUS Technology Group and Allan Bonner Columnist Personal information is personal. Period. Other than professional athletes and most presidential candidates, few people want the world to know what medical procedures they’ve had. People who’ve had abortions, psychiatric counselling, sexually transmitted diseases (STDs) or sex reassignment surgery have done so thinking it would…

Guarding against the many dangers floating in the cloud

In cyber space, far too much is in the public realm or easily obtained. And that puts your reputation, money and job prospects at risk

Guarding against the many dangers floating in the cloudBy Brennen Schmidt ALEUS Technology Group and Allan Bonner Columnist When safe sex became a necessity after the AIDS crisis, a valuable analogy came into being. The caution was that you’re having sex with everyone your partner ever had sex with. This was sobering for lovers. It turns out it’s also a lesson for business…

How cyber safe is your municipality?

IT dangers are everywhere. But municipalities – and other levels of government – do too little to be prepared for inevitable failures

How cyber safe is your municipality?By Brennen Schmidt ALEUS Technology Group and Allan Bonner Troy Media columnist There’s a line item missing from your town’s budget. It’s missing from all government budgets. It should be called Digital Liability. Even city budget chiefs and national finance officials aren’t dealing with the dangers and vulnerabilities of cyber space. Here’s an example. Your…

5 things that you should never post on social media

Sharing personal information can be dangerous for you

5 things that you should never post on social mediaSocial media is now the best way to interact with many people around the world. Millions of users post every day on different social media platforms. Some have even more than one social media account. People share thoughts and personal feelings but sharing too much information isn’t always good. Even previously secretive people in Australia…

The modern, efficient criminal is digitally casing you

You're being tracked, watched, listened to – and you're just living a normal life. The threat of a personal data breach is real and constant

The modern, efficient criminal is digitally casing youBy Brennen Schmidt ALEUS Technology Group and Allan Bonner Troy Media columnist “I don’t have anything to hide,” say many social media users and online shoppers. But most of us do have something to hide – we just aren’t sure what it is. You pass by hospitals and supermarkets. You may also pass a university…

Big threats to personal privacy in the era of big data

The modern politician, even in a democracy, can now be almost certain to know how you voted by adding up what’s known about you

Big threats to personal privacy in the era of big dataBy Allan Bonner Columnist and Brennen Schmidt ALEUS Technology Group In the days before computers, politicians still had a way to determine how much help they’d give you. If you asked for a favour, many would look you up on the voter rolls to see if you’d voted. If so, there was at least a…

Solving the identity theft puzzle will take teamwork

Collaboration among business and all levels of government can mean more secure transactions and a significant drop in identity theft

Solving the identity theft puzzle will take teamworkBy Allan Bonner Troy Media columnist and Brennen Schmidt ALEUS Technology Group It’s easier than ever to spend money. In fact, it’s become quite fashionable. Take Apple Watch. Pressing twice on the side of the device lets the user choose a virtual credit card of choice. The user completes the transaction simply by positioning the…

The technology trap: only the vigilant will survive

A lack of care can be catastrophic in the cyber world (just ask Equifax). And the lessons learned apply to us all

The technology trap: only the vigilant will surviveBy Brennen Schmidt ALEUS Technology Group and Allan Bonner Troy Media columnist Trust – like time – can’t be bought. It takes time to build and can be lost in an instant. Most large organizations’ core values speak of trust. For some, trust is a prerequisite for success. All rely on trust whether they speak about…

The Internet’s dark side has made cybersecurity essential

Modern monsters take the shape of cyber attacks, email hacking, Internet fraud, cyber bullying, political instability, identity theft, viruses and much more

The Internet’s dark side has made cybersecurity essentialThe contemporary global electronic connectivity that I call internetization has opened a great new frontier of opportunity and empowerment. It’s a positive force for electronic accessibility and digital outreach. But it has also unleashed an environment similar to that of the wild west before law and order was established. The new frontier of the contemporary electronic world…

Internetization is the new normal in the 21st century

It has enhanced the quality of our lives, and made our daily tasks easier and quicker. It has also unleashed a darker side to its opportunities and outreach

Internetization is the new normal in the 21st centuryA few years ago, I was preparing a lecture on globalization. I wanted to use the word globalization as one of the pillars of the global economy of the 21st century. The problem was that globalization wasn’t a new concept. World history reveals that global linkages between countries through trade, military conquest, colonization and cultural outreach have…

Protect yourself from financial phishing

Welcome to the predatory online scamming world. Fraudulent emails, often containing links or attachments, are dangerous. If it seems too good to be true, it is

Protect yourself from financial phishingBeware the phishing hook. Phishing describes an attempt to get you to unknowingly disclose personal information such as credit card details, banking information, usernames and passwords. The party trying to gather your information will try to hook you by sending you an email and asking you to click on a link. The email will look…

Ransomware: Why do 70 per cent of businesses pay up?

The vulnerability of a business to cybercrime isn’t a lesson anybody wants to learn the hard way

Ransomware: Why do 70 per cent of businesses pay up?A type of malware that encrypts computer data until the owner pays a fee for its release, ransomware has been around almost as long as the internet has, with a questionably named trojan made in 1989 serving as the progenitor for more modern and sophisticated variants like CryptoLocker, CryptoWall, and Locky. It’s not the vintage…