You may have heard that longer passwords are stronger passwords, but is that really the case? What is the best password length for security? How long should a passphrase be? In this quick guide, we’ll go over the basics for creating a secure online password.  The difference between a password and a passphrase The terms…

Read More

Garmin is in trouble. The famous manufacturer of sports, outdoor and fitness technology was brought to its knees by a ransomware attack in mid-2020, prompting days of outages. It’s not the first organization to fall victim to this kind of attack though, and it certainly won’t be the last. Ransomware has grown in popularity in…

Read More

Even our storage is online now. With the rise of SaaS companies and many cloud storage solutions, everyone from the average consumer to the largest corporations in the world have moved their data storage to the cloud. But what does “the cloud” actually mean? What cloud storage is You’ve probably driven by a storage locker…

Read More

Today’s smartphones and some computers have a variety of different methods that can be used to unlock them. Two of the most common are fingerprints (especially on newer and higher-end smartphones) and PINs. But which one is most secure? How fingerprint biometrics work When you’re logging into your phone with a fingerprint, you might think…

Read More

Cloud storage is extremely popular today, and we’re big fans. People are using tools from DropBox to OneDrive to store their files. But in a business environment, one major concern is the security of cloud storage. Nothing about the cloud makes it any more or any less secure than any other file storage method.

Read More

One of the key layers of cybersecurity is good password hygiene. But today’s security can make the situation more complex. Now you have password managers, two factor authentication using apps, fingerprint protection, and even facial identification.

Read More

Ever wondered why most systems can’t tell you what password you used when you signed up? Or wondered if your password was being stored insecurely by a service you were using? How can you even tell if it’s stored securely, and what does that mean?

Read More

I’m often asked how cloud computing works. People tell me they have no experience with it and don’t understand it. The truth is, if you’ve had somebody hosting your email for ten years, then you’ve used cloud computing for ten years.

Read More

Nobody wants to believe they can become a victim of a phishing attack. After all, you’re smarter than that, right? The truth is that even smart people fall for them, and phishing attacks are on the rise as a result. However, the tactics they use have changed in the last year or so. When phishing…

Read More

In years past, data storage for many organizations was done through local servers. In the last couple of decades, a couple different options have become widespread: Network Attached Storage—NAS— and the cloud.

Read More