Bob McMahon
- Total activity 22
- Last activity
- Member since
- Following 0 users
- Followed by 0 users
- Votes 0
- Subscriptions 6
Activity overview
Latest activity by Bob McMahon-
Bob McMahon created an article,
Common VPN Connection Issues and How to Fix Them
1. Check Your Internet ConnectionBefore diving into VPN-specific fixes, ensure your internet is working properly:Try opening a website (such as google.com) to confirm you have internet access.If yo...
-
Bob McMahon created an article,
Data Privacy & Breach Report: Major Social Media Platform Suffers Data Exposure Affecting Millions
April 2024A detailed breach analysis published by DataSecure Insights uncovered a significant data exposure at the social media giant “FriendConnect,” impacting over 50 million user accounts worldw...
-
Bob McMahon created an article,
Global Cybersecurity Threat Report Q1 2024: Ransomware Attacks Shift Focus to Healthcare Sector
April 2024 – WorldwideAccording to the new quarterly threat intelligence report published by SecureNet Global, ransomware campaigns have shifted their focus predominantly to the healthcare sector. ...
-
Bob McMahon created an article,
Cybersecurity Report: Rise in Phishing Attacks Targeting Remote Workers April 2025 – Global
The latest cybersecurity report from CyberWatch Analytics reveals a significant increase in phishing attacks targeting remote employees, with incidents rising by 35% during the first quarter of 202...
-
Bob McMahon created an article,
Incident Reporting & Response: Ensuring a Secure Workplace
In today’s fast-paced work environment, maintaining the security and integrity of our company’s information and physical assets is everyone’s responsibility. Prompt and effective incident reporting...
-
Bob McMahon created an article,
How to Connect to VPN on Your Mobile Device: Step-by-Step Guide for iOS and Android
As part of our commitment to maintaining a secure and flexible work environment, connecting to the company VPN (Virtual Private Network) on your mobile device is essential when accessing internal r...
-
Bob McMahon created an article,
What Steps Should I Take If I Think I Accidentally Shared Sensitive Data?
OverviewAccidentally sharing sensitive data can happen to anyone, but quick and appropriate action is essential to minimize risks to Ernst & Young (EY), our clients, and colleagues. Sensitive data...
-
Bob McMahon created an article,
Phishing & Social Engineering Awareness at Ernst & Young
OverviewPhishing and social engineering attacks are among the most common and effective tactics cybercriminals use to gain unauthorized access, steal sensitive information, or compromise EY systems...
-
Bob McMahon created an article,
Access Management & Authentication at Ernst & Young
OverviewAccess management and authentication are critical components of EY’s cybersecurity framework. They ensure that only authorized personnel have access to our systems and sensitive information...
-
Bob McMahon created an article,
Understanding Ernst & Young Security Policies & Compliance
OverviewAt Ernst & Young (EY), maintaining the highest standards of security is essential to protecting our clients, our people, and our business. Our security policies and compliance requirements...