How Data Brokers Collect, Sell, and Profit From Your Personal Information

There’s an entire market built around your personal data, and most people have no idea it exists. Behind the websites you visit, the forms you fill out, and the apps you use, there’s a network of companies collecting, packaging, and... Read More

How to Opt Out of the Florida Residents Directory – Step-by-Step Guide for Data Protection

If you’re a Florida resident, your personal information may be publicly accessible through the Florida Residents directory. This searchable database compiles names, addresses, and other identifying details without anyone’s consent. While this data is technically legal to publish, it can... Read More

How to Opt Out of 411.com – Step-by-Step Removal & Security Help

If you’ve ever searched your own name online, you may have found your personal information on data broker sites like 411.com. They collect and display personal data taken from public records and third-party sources, often without your knowledge. While it... Read More

Focus on security education, not cyber awareness training

Written by Karen Walsh Phishing scams and other social engineering attacks work because cybercriminals use people’s digital footprints against them. Threat actors scrape social media and the internet, looking for insights about people. Cybersecurity awareness training programs, however, rarely teach people... Read More

CEO fraud: Protecting executives protects everyone

Cybercriminals do what they do for money. According to the 2022 Data Breach Investigations Report, 96% of data breaches were caused by external actors motivated by financial or personal gain. In order to maximize their return on investment, these cybercriminals take... Read More

Essential guide to open-source intelligence (OSINT)

DOWNLOAD E-BOOK Exploitation through publicly available information is the single largest threat to companies and their people today. Known as Open-Source Intelligence, or OSINT, this public data reveals to hackers how they can compromise human targets via social engineering attacks and defeat... Read More

Security Guy TV features Picnic

Security Guy TV on how Picnic helps organizations see and remediate human risk beyond the corporate firewall Picnic CEO Matt Polak joined security expert Chuck Harold of Security Guy TV yesterday to talk about the problem of social engineering and how Picnic works to remediate... Read More

For Lapsus$ social engineers, the attack vector is dealer’s choice

By Matt Polak, CEO of VanishID Two weeks ago, at a closed meeting of cyber leaders focused on emerging threats, the group agreed that somewhere between “most” and “100%” of cyber incidents plaguing their organizations pivoted on social engineering. That’s no... Read More

How to sharpen your corporate social media policy for today’s threats

Using social media is, without a doubt, one of the most popular online activities that internet users engage in. Businesses have also discovered how to leverage social media to create opportunities for their brands. However, the use of these platforms... Read More

An ocean of data…and of ears

How much data is produced every day? A quick Google search will tell you the current estimate stands at 2.5 quintillion bytes. For those of us that don’t know the difference between our zettabytes and yottabytes, that’s 2.5 followed by... Read More

Cybercrime awareness is no longer enough to reduce risk

People’s perceptions have changed. Not so long ago we thought nothing of kids playing outside all day alone, unchaperoned visits to a friend’s house, walking to school alone – the list goes on. But as times have changed, we have... Read More

Are we thinking about Surveillance Capitalism the right way?

I recently purchased a greenhouse from a well-known catalogue retailer – now I’m swamped with Google and Facebook ads for greenhouse accessories and all manner of gardening paraphernalia. Ever wonder why this happens? The answer is that our data is... Read More

How much control have we given up just to enjoy the digital life?

We all enjoy life in the digital age and the Internet provides us connectivity, efficiency and fun. By submitting some of our personal data into online interfaces, we enjoy significant benefits in the form of services tailored to our needs;... Read More

Social engineering in the workplace

Everyone is familiar with the case in which the proverbial “little old lady” is duped out of her life savings by a villain contacting her through the phone or email. The “Nigerian Scam” or “Advance-fee Scam” is once such classic... Read More

Copyright © 2019 – 2025 Picnic Corporation (dba VanishID)