Linux has built in encryption for several years now, yet enterprises still struggle with encryption on Linux laptops. Why is that? To answer this question, let’s first review the disk encryption capabilities that are built into Linux:
When you think of retail, what’s the first thing that comes to mind? It’s probably the sound of a credit card being processed by a cashier. Hackers also hear the noise of a register, only they’re hearing it because they’ve stolen your financial information and are spending your money on merchandise you’ll never use.
Imagine this: your worst nightmare has taken place. You’ve found out that you’ve been hacked. Your most valuable data is now in someone else’s hands, and your company is going to suffer enormous damage to its reputation. What do you do now? Your first instinct is probably to assign blame. Here’s what you should do instead: ask the following questions about the hack. They’ll help you make sense of it.
On November 24th, 2014 a group of hackers calling themselves “The Guardians of Peace” or the “GOP” leaked large amounts of data from Sony entertainment’s internal servers.
Staffordshire University in UK reported that a laptop containing applicant information was stolen from a car belonging to a staff member. Due to the size of the data file, the information was held locally on the hard drive of the laptop.
Whether you’re ready to admit it or not, the holiday shopping season is upon us. Take a minute and ask yourself: what kind of shopper am I? Do you tend to finish your gift-giving excursions back in August, or will you be spending the night before your holiday scrounging for last minute ideas? Regardless of which bucket you fall into, there are two upcoming days dedicated solely to shoppers of all kinds: Black Friday and Cyber Monday.