Aug 23 2016
Your Email is the Treasure Hackers Want to Plunder

Personal Data Protection Education is the Best Defense Series 2 of 6 Email is the preferred method of hackers to…

LEARN MORE
Jan 18 2016
Identity Protection for Those Affected by the OPM Data Breach

Layer 8 Security specializes in improving the cybersecurity posture of companies big and small, but we also strive to protect individuals…

LEARN MORE
Jan 11 2016
Long Awaited Cybersecurity Bill – CISA 2015

The Cybersecurity Information Sharing Act (CISA) of 2015 recently became law before the new year. The proposal, while controversial, has evolved…

LEARN MORE
Dec 30 2015
What’s the deal with LifeLock?

I often get questions from friends and family about LifeLock, an identity theft protection service – what it’s all about,…

LEARN MORE
Nov 02 2015
Terms of Service and Privacy Policy Changes Making the News

Today, Snapchat, the popular social media mobile app that allows users to send instantly-destructible pictures and videos to friends, has…

LEARN MORE
Aug 25 2015
Why Companies Respond Slowly To Breaches

You’d think it would be a long, drawn out reason, with lots of calculations and pretty charts. It’s not. Per…

LEARN MORE

Talk with our award-winning team