MySudo Blog

How Sudo Digital Identities Protect Your Personal Identity

When an application, like a dating site, requests personal information from its users, it is in a good position to obtain (or supply to a data broker) a broad spectrum of personally identifiable information (PII) about a user. This PII can divulge highly sensitive information about a user, such as home location, medical details, personal finances, employment […]

438 views
How Sudos Can Give You a Second Chance at Digital Privacy

Think about this: given the extent of the global data privacy crisis, your personal phone number and email address are probably already compromised beyond repair. It’s an interesting thought, isn’t it?  To get the idea, you’ve only got to look at how you use your personal information online, and what happens to your data once […]

541 views
Why Compartmentalizing Your Private Data Is Simple With MySudo

Imagine for a moment, you were caught up in one of the 7,098 data breaches reported in 2019 (the highest number on record) or one of the breaches yet to be discovered. Let’s say it’s a shopping site. Perhaps you don’t have to imagine. Perhaps you lived it. If you’re like most of the 4.5 billion internet users, you’ll have […]

550 views
What Is Whale Phishing?

Whale phishing is a targeted attack on a high-value target or executive to gain sensitive information. Protection against a whale attack includes the combined efforts of IT departments, the C-suite, and individual discrepancy.

415 views
What Is “Vishing” or Phone Phishing?

Phone phishing is how scammers try to obtain personal or financial information via call or text. Vishing attacks might utilize a number of tactics, including phone number spoofing. Protect yourself and others by reporting spoofed numbers.

492 views
What Is Spear Phishing?

“Spear phishing” is a type of phishing that involves gathering information about a person or company in order to carry out a personalized attack with a better chance at success.

592 views
Have I Been Hacked? How to Tell If You Have A Compromised Account and What to Do About It

Whether it’s a social media account or bank account, it seems that almost everyone gets hacked at some point or another. This article will explain the basics of an increasingly common issue: hacking. It will define the term in the appropriate context, explain how unauthorized users gain access to others’ devices and accounts, and go over some of the most common signs that your resources are likely to have been compromised. It will conclude with a discussion of important things readers should do if they suspect or know that their account was hacked.

2K views
What Is the Google Docs Phishing Scam?

The Google Doc phishing scam reached nearly one million people by mimicking the popular Google Docs app. Phishing scams rely on the trust of the user to gain information.

2.3K views
What Is Phishing and How to Protect Yourself Against Phishing Attacks

Spam emails and texts are an ever-evolving annoyance. Filters and other methods of blocking spam are constantly being developed, but the spammers simply improve their own methods in response.

724 views
What Is Identity Theft, and Can It Be Avoided?

Sometimes referred to as identity fraud, identity theft occurs when someone uses your personal information — such as your Social Security Number or driver’s license

894 views
Cybersecurity Risks While Traveling: How to Keep Yourself (And Your Devices) Safe on the Road

Technology has made travel significantly easier in some ways, such as purchasing flights and booking hotels, but it has also led to new risks for travelers.

687 views
Internet Safety for Children: 7 Tips to Protect Your Kids Online

As parents, we frequently agonize over the best approach to keeping our children safe online. If your child is old enough to use the Internet […]

867 views
How I Avoid Security Fatigue at Home

It is now rare that a month goes by without a significant data breach being disclosed or discovered. The most recent event I have been reading about […]

504 views