Cybersecurity

Can hashed passwords be hacked?

By Brandon Jackson

In the world of cybersecurity, a well-known concept is hashing, which is when a system uses an algorithm to modify a password before storing it or checking it against a stored password. It’s a powerful security tool. Let’s dive more into what hashing is and whether or not hashed passwords can be hacked. How hashing…

Read More

How can I work remotely, securely?

By John Merrey

Working remotely is very common, but more people are being encouraged to work from home because of the ongoing, challenging events in 2020 and beyond. Organizations have closed down or decided to allow their employees to work remotely as a safety precaution, and that trend will likely continue into the future.

As if the pandemic challenges aren’t enough, employees who work from home are at risk for…

Read More

What cybersecurity can prevent

By John Merrey

Cybersecurity protection is always changing, as there are also new developments in technology. It helps protect computer software, hardware, and data from cyber threats. Cyber threats can be very damaging to your computer system, and your most valuable information can be stolen. Everyone needs to implement some form of cybersecurity to prevent these things from…

Read More

How long should a passphrase be?

By Brandon Jackson

You may have heard that longer passwords are stronger passwords, but is that really the case? What is the best password length for security? How long should a passphrase be? In this quick guide, we’ll go over the basics for creating a secure online password.  The difference between a password and a passphrase The terms…

Read More

Is LastPass secure?

By John Merrey

LastPass is one of the most popular password management services out there, and it’s trusted by many users. But is it really secure? Why password managers exist Keeping track of passwords for everything online can get hard, so many users fall back on lazy habits like using the same password for everything. That’s horrible for…

Read More

What are ransomware attacks?

By Brandon Jackson

Garmin is in trouble. The famous manufacturer of sports, outdoor and fitness technology was brought to its knees by a ransomware attack in mid-2020, prompting days of outages. It’s not the first organization to fall victim to this kind of attack though, and it certainly won’t be the last. Ransomware has grown in popularity in…

Read More

Can phishing be prevented?

By John Merrey

Phishing is one of the most common online attacks. Last year 22 percent of attacks came through phishing, and if you’re not careful you could be a victim. This method of stealing someone’s data by spoofing a message from a legitimate company is an insidious trick that can be easier to fall for than you…

Read More

Is a fingerprint less secure than a PIN?

By Brandon Jackson

Today’s smartphones and some computers have a variety of different methods that can be used to unlock them. Two of the most common are fingerprints (especially on newer and higher-end smartphones) and PINs. But which one is most secure? How fingerprint biometrics work When you’re logging into your phone with a fingerprint, you might think…

Read More

Is cloud storage secure?

By Brandon Jackson

Cloud storage is extremely popular today, and we’re big fans. People are using tools from DropBox to OneDrive to store their files. But in a business environment, one major concern is the security of cloud storage. Nothing about the cloud makes it any more or any less secure than any other file storage method.

Read More

What are cybersecurity threats?

By John Merrey

Cybersecurity is protecting yourself agains online threats. Here at TeamLogic IT, we focus on protecting entire environments against malicious parties getting in. A lot of layers and methods of protection go into that.

Read More