Skip to content

Firewall Times

  • About

Catherine Reed

Catherine Reed is a writer and researcher with experience writing about a wide variety of topics including personal finance, technology, and staffing.

How to Tell If Your SIM Card Has Been Hacked

March 20, 2023 by Catherine Reed

How to Stop Someone from Spying on Your Cell Phone

March 13, 2023 by Catherine Reed

AT&T Data Breaches: Full Timeline Through 2023

March 9, 2023 by Catherine Reed

T-Mobile Data Breaches: Full Timeline Through 2023

March 6, 2023 by Catherine Reed

Verizon Data Breaches: Full Timeline Through 2023

February 27, 2023 by Catherine Reed

Policy vs. Procedure: Know the Difference

January 2, 2023 by Catherine Reed

Data Destruction: What It Is & How It Protects Data

December 19, 2022 by Catherine Reed

Data Leak Notice on iPhone – What to Do About It

December 8, 2022 by Catherine Reed

Amazon Hacked? 5 Ways It Can Happen

March 17, 2023November 25, 2022 by Catherine Reed

Netflix Hacked? How to Tell & What to Do About It

November 17, 2022 by Catherine Reed

5 Ways to Fix a Hacked Android Phone

November 7, 2022November 7, 2022 by Catherine Reed

Disaster Recovery Sites: Hot, Warm, and Cold

October 17, 2022 by Catherine Reed

How WPS Attacks Work – And How to Protect Your Network

October 3, 2022 by Catherine Reed

Clean Desk Policy: What, How, & Why

September 26, 2022 by Catherine Reed

How to Create a Strong Data Retention Policy

September 12, 2022 by Catherine Reed

How Layered Security Can Protect Your Network

August 29, 2022 by Catherine Reed

What Is a Data Owner?

August 22, 2022 by Catherine Reed

Sensitive Data: Definition, Examples & More

August 15, 2022August 15, 2022 by Catherine Reed

39 Must-Read Phishing Statistics & Facts – 2022

August 9, 2022August 8, 2022 by Catherine Reed

Netflix Data Breaches: Full Timeline Through 2022

August 5, 2022July 18, 2022 by Catherine Reed

Snapchat Data Breaches: Full Timeline Through 2022

July 18, 2022 by Catherine Reed

36 Enlightening Cybersecurity Statistics

July 11, 2022 by Catherine Reed

11 Eye-Catching Hacker Statistics

June 27, 2022 by Catherine Reed

23 Small Business Cybersecurity Statistics – 2022

June 13, 2022 by Catherine Reed

27 Must-Know Malware Statistics

May 30, 2022 by Catherine Reed

18 Types of Hacking: White Hat, Black Hat, & Beyond

May 23, 2022 by Catherine Reed

21 Social Engineering Statistics – 2022

May 16, 2022 by Catherine Reed

10 Eye-Catching Spear Phishing Statistics – 2022

May 9, 2022 by Catherine Reed

26 Eye-Opening Data Breach Statistics – 2022

May 2, 2022 by Catherine Reed

Top 10 Biggest Data Breaches of All Time

October 4, 2022April 18, 2022 by Catherine Reed

44 Eye-Catching Cell Phone Usage Statistics

March 30, 2022March 29, 2022 by Catherine Reed

32 Key Cyber Attack Statistics

June 22, 2022February 14, 2022 by Catherine Reed

22 Intriguing Employee Engagement Statistics – 2022

February 7, 2022 by Catherine Reed

Epic Games Security Breaches: Full Timeline Through 2022

February 1, 2022 by Catherine Reed

Instagram Data Breaches: Full Timeline Through 2022

March 21, 2022January 18, 2022 by Catherine Reed

Physical Security Controls: An Overview

January 10, 2022 by Catherine Reed

Sony Data Breaches: Full Timeline Through 2022

May 27, 2022January 3, 2022 by Catherine Reed

12 Famous Hackers & Cybercriminals

October 6, 2021 by Catherine Reed

23 Insightful Peer Pressure Statistics

September 27, 2021 by Catherine Reed

Administrative Security Controls: Policies, Training, & More

September 15, 2021 by Catherine Reed

20 Insightful Leadership Statistics

September 13, 2021 by Catherine Reed

Tailgating Attacks: Understand the Risk

August 24, 2022August 23, 2021 by Catherine Reed

Historical Budgeting: How It Works

August 9, 2021August 6, 2021 by Catherine Reed

External Threats: Everything You Need to Know

August 30, 2021August 2, 2021 by Catherine Reed

Internal Threats: Everything You Need to Know

August 2, 2021 by Catherine Reed

24 Intriguing Time Management Statistics

July 26, 2021 by Catherine Reed

32 Enlightening Coffee Statistics

June 28, 2021 by Catherine Reed

34 Dog Bite Statistics

June 21, 2021 by Catherine Reed

16 Insightful Chargeback Statistics

March 24, 2021 by Catherine Reed

24 Eye-Catching Ransomware Statistics – 2020

May 24, 2022December 9, 2020 by Catherine Reed

Where to Report Suspected Phishing Emails

December 2, 2020December 2, 2020 by Catherine Reed

Topics

  • Access Control (18)
  • Attacks (19)
  • Breaches (24)
  • Compliance (5)
  • Cryptography (1)
  • Data (6)
  • Fraud (2)
  • Miscellaneous (2)
  • Network Security (1)
  • Phishing (15)
  • Privacy (6)
  • Resilience (6)
  • Risk Management (2)
  • Security Controls (6)
  • Statistics (11)
  • Tech (14)

Related Posts

  • How to Stop Someone from Spying on Your Cell Phone
  • How Companies Track You Online – The Definitive Guide
  • How to Protect Your Privacy Online
  • Android Privacy Settings: What to Know
  • Personally Identifiable Information (PII)
About

Privacy Policy

Contact
© 2023 Firewall Times • Built with GeneratePress