Skip to content

Firewall Times

  • About

How to Tell If Your SIM Card Has Been Hacked

March 20, 2023 by Catherine Reed

Recent Data Breaches – 2023

March 17, 2023 by Michael X. Heiligenstein

Amazon Data Breaches: Full Timeline Through 2023

March 17, 2023 by Michael X. Heiligenstein

Key Management: the Ultimate Guide

March 16, 2023 by Michael X. Heiligenstein

How to Stop Someone from Spying on Your Cell Phone

March 13, 2023 by Catherine Reed

AT&T Data Breaches: Full Timeline Through 2023

March 9, 2023 by Catherine Reed

T-Mobile Data Breaches: Full Timeline Through 2023

March 6, 2023 by Catherine Reed

Proprietary Data

March 2, 2023 by Michael X. Heiligenstein

Verizon Data Breaches: Full Timeline Through 2023

February 27, 2023 by Catherine Reed

Google Data Breaches: Full Timeline Through 2023

January 31, 2023 by Michael X. Heiligenstein

RTO & RPO: Understand the Difference

January 30, 2023 by Michael A. Flowers Sr.

How to Use an After-Action Report – Including Template

January 23, 2023January 20, 2023 by Michael A. Flowers Sr.

Top 10 Biggest Data Breaches of 2022

January 10, 2023 by Michael X. Heiligenstein

2021 Data Breaches: A Full Timeline

January 10, 2023 by Michael X. Heiligenstein

Twitter Data Breaches: Full Timeline Through 2023

January 11, 2023January 5, 2023 by Michael X. Heiligenstein

Policy vs. Procedure: Know the Difference

January 2, 2023 by Catherine Reed

Data Destruction: What It Is & How It Protects Data

December 19, 2022 by Catherine Reed

Uber Data Breaches: Full Timeline Through 2022

December 14, 2022 by Michael X. Heiligenstein

Data Leak Notice on iPhone – What to Do About It

December 8, 2022 by Catherine Reed

Microsoft Data Breaches: Full Timeline Through 2022

January 20, 2023November 25, 2022 by Michael X. Heiligenstein

Amazon Hacked? 5 Ways It Can Happen

March 17, 2023November 25, 2022 by Catherine Reed

Netflix Hacked? How to Tell & What to Do About It

November 17, 2022 by Catherine Reed

What a VPN Concentrator Does – And How It Works

November 14, 2022 by Michael A. Flowers Sr.

5 Ways to Fix a Hacked Android Phone

November 7, 2022November 7, 2022 by Catherine Reed

Disaster Recovery Sites: Hot, Warm, and Cold

October 17, 2022 by Catherine Reed

Apple Data Breaches: Full Timeline Through 2022

October 3, 2022 by Michael X. Heiligenstein

How WPS Attacks Work – And How to Protect Your Network

October 3, 2022 by Catherine Reed

Clean Desk Policy: What, How, & Why

September 26, 2022 by Catherine Reed

Lapsus$ Group Cyberattacks: Methods, Motives, & Timeline

October 4, 2022September 19, 2022 by Michael X. Heiligenstein

How to Create a Strong Data Retention Policy

September 12, 2022 by Catherine Reed

5 Insightful Cloud Security Tips

September 8, 2022 by Michael X. Heiligenstein

TikTok Data Breaches: Full Timeline Through 2022

September 7, 2022September 6, 2022 by Michael X. Heiligenstein

How Layered Security Can Protect Your Network

August 29, 2022 by Catherine Reed

Fire Suppression Systems: the Ultimate Guide

August 25, 2022 by Michael X. Heiligenstein

What Is a Data Owner?

August 22, 2022 by Catherine Reed

Mantraps: What You Need to Know

August 18, 2022 by Michael X. Heiligenstein

Sensitive Data: Definition, Examples & More

August 15, 2022August 15, 2022 by Catherine Reed

Authentication vs Authorization: Know the Difference

August 24, 2022August 11, 2022 by Michael X. Heiligenstein

39 Must-Read Phishing Statistics & Facts – 2022

August 9, 2022August 8, 2022 by Catherine Reed

iCloud Hacked? How to Tell (And What to Do About It)

August 2, 2022 by Michael X. Heiligenstein

Snapchat Hacked? Here’s What to Do About It

July 25, 2022 by Michael X. Heiligenstein

Netflix Data Breaches: Full Timeline Through 2022

August 5, 2022July 18, 2022 by Catherine Reed

Snapchat Data Breaches: Full Timeline Through 2022

July 18, 2022 by Catherine Reed

36 Enlightening Cybersecurity Statistics

July 11, 2022 by Catherine Reed

11 Eye-Catching Hacker Statistics

June 27, 2022 by Catherine Reed

Amazon Web Services (AWS) Data Breaches: Full Timeline Through 2022

June 23, 2022June 22, 2022 by Michael X. Heiligenstein

23 Small Business Cybersecurity Statistics – 2022

June 13, 2022 by Catherine Reed

SOC 2 Reports: What You Need to Know

June 6, 2022 by Michael X. Heiligenstein

27 Must-Know Malware Statistics

May 30, 2022 by Catherine Reed

SOC 1 vs SOC 2: Know the Difference

May 25, 2022 by Michael X. Heiligenstein

18 Types of Hacking: White Hat, Black Hat, & Beyond

May 23, 2022 by Catherine Reed

21 Social Engineering Statistics – 2022

May 16, 2022 by Catherine Reed

SOC 2 Type II Compliance: What You Need to Know

May 11, 2022 by Michael X. Heiligenstein

10 Eye-Catching Spear Phishing Statistics – 2022

May 9, 2022 by Catherine Reed

SOC 2 Compliance: Everything You Need to Know

May 4, 2022May 4, 2022 by Michael X. Heiligenstein

26 Eye-Opening Data Breach Statistics – 2022

May 2, 2022 by Catherine Reed

Amazon Mission Statement, Vision, and Values

April 25, 2022 by Michael X. Heiligenstein

Top 10 Biggest Data Breaches of All Time

October 4, 2022April 18, 2022 by Catherine Reed

Uber Mission Statement, Vision, and Values

April 15, 2022 by Michael X. Heiligenstein

Spear Phishing vs Phishing: Know the Difference

April 7, 2022April 7, 2022 by Michael X. Heiligenstein

6 Phishing Email Examples: How to Spot the Scam

March 31, 2022March 30, 2022 by Michael X. Heiligenstein

44 Eye-Catching Cell Phone Usage Statistics

March 30, 2022March 29, 2022 by Catherine Reed

44 Eye-Opening Social Media Addiction Statistics

March 30, 2022March 18, 2022 by Michael X. Heiligenstein

32 Key Cyber Attack Statistics

June 22, 2022February 14, 2022 by Catherine Reed

22 Intriguing Employee Engagement Statistics – 2022

February 7, 2022 by Catherine Reed

Epic Games Security Breaches: Full Timeline Through 2022

February 1, 2022 by Catherine Reed

Netflix Mission Statement, Vision, and Values

March 21, 2022January 26, 2022 by Michael X. Heiligenstein

Facebook Data Breaches: Full Timeline Through 2022

March 21, 2022January 18, 2022 by Michael X. Heiligenstein

Instagram Data Breaches: Full Timeline Through 2022

March 21, 2022January 18, 2022 by Catherine Reed

Apple Mission Statement, Vision, and Values

March 21, 2022January 17, 2022 by Michael X. Heiligenstein

Physical Security Controls: An Overview

January 10, 2022 by Catherine Reed

Sony Data Breaches: Full Timeline Through 2022

May 27, 2022January 3, 2022 by Catherine Reed

Cipher Locks: Know Before You Buy

December 2, 2021 by Michael X. Heiligenstein

Access Control: Everything You Need to Know

August 24, 2022November 22, 2021 by Michael X. Heiligenstein

The Principle of Least Privilege

August 24, 2022November 19, 2021 by Michael X. Heiligenstein

Authentication, Authorization, and Accounting: the AAA Framework

August 24, 2022November 10, 2021 by Michael X. Heiligenstein

Discretionary Access Control: How It Works

August 24, 2022November 1, 2021 by Michael X. Heiligenstein

Mandatory Access Control: How It Works

August 24, 2022October 27, 2021 by Michael X. Heiligenstein

Access Control Lists: What They Are & How They Work

August 24, 2022October 18, 2021 by Michael X. Heiligenstein

Technical Security Controls: Encryption, Firewalls & More

October 14, 2021 by Michael X. Heiligenstein

Logical Access Control: How It Works

December 9, 2022October 11, 2021 by Michael X. Heiligenstein

12 Famous Hackers & Cybercriminals

October 6, 2021 by Catherine Reed

Biometric Access Control: What You Need to Know

August 24, 2022October 4, 2021 by Michael X. Heiligenstein

23 Insightful Peer Pressure Statistics

September 27, 2021 by Catherine Reed

How Often Cyberattacks Happen: Key Statistics

November 19, 2021September 20, 2021 by Michael X. Heiligenstein

Administrative Security Controls: Policies, Training, & More

September 15, 2021 by Catherine Reed

20 Insightful Leadership Statistics

September 13, 2021 by Catherine Reed

Tailgating Attacks: Understand the Risk

August 24, 2022August 23, 2021 by Catherine Reed

Types of Access Control

August 24, 2022August 9, 2021 by Michael X. Heiligenstein

Historical Budgeting: How It Works

August 9, 2021August 6, 2021 by Catherine Reed

External Threats: Everything You Need to Know

August 30, 2021August 2, 2021 by Catherine Reed

Internal Threats: Everything You Need to Know

August 2, 2021 by Catherine Reed

Non Discretionary Access Control: Definition & More

August 24, 2022July 28, 2021 by Michael X. Heiligenstein

24 Intriguing Time Management Statistics

July 26, 2021 by Catherine Reed

Physical Access Control: the Ultimate Guide

August 24, 2022July 21, 2021 by Michael X. Heiligenstein

Outdoor Perimeter Security: Layers of Defense

August 30, 2021July 21, 2021 by Michael X. Heiligenstein

Active Reconnaissance: What You Need to Know

July 19, 2021 by Austin Proctor

Passive Reconnaissance: What You Need to Know

July 19, 2021 by Austin Proctor

Access Control Policy: What to Include

August 24, 2022July 12, 2021 by Michael X. Heiligenstein

32 Enlightening Coffee Statistics

June 28, 2021 by Catherine Reed
Older posts
Page1 Page2 Next →

Topics

  • Access Control (18)
  • Attacks (19)
  • Breaches (24)
  • Compliance (5)
  • Cryptography (1)
  • Data (6)
  • Fraud (2)
  • Miscellaneous (2)
  • Network Security (1)
  • Phishing (15)
  • Privacy (6)
  • Resilience (6)
  • Risk Management (2)
  • Security Controls (6)
  • Statistics (11)
  • Tech (5)

Related Posts

  • How to Stop Someone from Spying on Your Cell Phone
  • How Companies Track You Online – The Definitive Guide
  • How to Protect Your Privacy Online
  • Android Privacy Settings: What to Know
  • Personally Identifiable Information (PII)
About

Privacy Policy

Contact
© 2023 Firewall Times • Built with GeneratePress