Category: Privacy & Security

Search

How Sudo Digital Identities Protect Your Personal Identity

When an application, like a dating site, requests personal information from its users, it is in a good position to obtain (or supply to a…

What’s the Big Problem with Using Your Personal Identity Online?

Identity is an important part of what it means to be human. People commonly believe they have a single, consistent, and unique identity that makes…

What Constitutes Personally Identifiable Information or PII?

If you’re trying to protect something, it’s important to understand exactly what it is you’re trying to protect.  This is true of personally identifiable information…

How We Apply the 7 Principles of Privacy by Design

Achieving great privacy outcomes does not happen by chance. It requires thoughtful, informed design. Most importantly, privacy management demands an interdisciplinary, systems engineering approach because it spans:…

How Sudos Can Give You a Second Chance at Digital Privacy

Think about this: given the extent of the global data privacy crisis, your personal phone number and email address are probably already compromised beyond repair….

We Need to Verify Your Identity for MySudo Virtual Cards—Here’s Why

You’re probably wondering why a company that’s setting new standards in digital privacy asks for your personal information when setting up a MySudo virtual card….

MySudo Virtual Cards Are Here

Every time you go online, you leave a trail of personal information that data brokers and criminals can scoop up like candy.  Every purchase, every…

What Is Whale Phishing?

Much like spear phishing (which generally targets an individual), whale phishing is a strategic scam specifically aimed at a high-value, powerful, or prominent target. This…

What Is “Vishing” or Phone Phishing?

As technology develops, so does the ingenuity of attacks on sensitive information. Cybercriminals use electronic communication to appear legitimate and trustworthy while asking for personal…

What Is Spear Phishing?

Phishing is a common type of scam aimed at stealing personal information from victims. The techniques phishers employ are becoming more sophisticated and varied. Considering…

Where Will Privacy Be in 10 Years?

When the International Association of Privacy Professionals recently released Visions of Privacy, a future-looking anthology of contributions from privacy thought-leaders around the world, we got…

Have I Been Hacked? How to Tell If You Have A Compromised Account and What to Do About It

Whether it’s a social media account or bank account, it seems that almost everyone gets hacked at some point or another. This article will explain…

What Is the Google Docs Phishing Scam?

Cybercriminals continue developing frightening levels of sophistication into their scams. One particularly cunning example is the Google Docs phishing scam, which proved how everyone —…

Safely sell your stuff with MySudo

Selling items online is convenient, but can also feel risky. MySudo is a great tool for selling your old couch, bike, iPhone online or other…

What Is Phishing and How to Protect Yourself Against Phishing Attacks

Spam emails and texts are an ever-evolving annoyance. Filters and other methods of blocking spam are constantly being developed, but the spammers simply improve their…

Add Your Heading Text Here

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Add Your Heading Text Here

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Never Miss An Update

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.