Cybersecurity
One of the key layers of cybersecurity is good password hygiene. But today’s security can make the situation more complex. Now you have password managers, two factor authentication using apps, fingerprint protection, and even facial identification.
Read MoreIt’s important to protect yourself from phishing scams. But what is a phishing scam? How is phishing accomplished in the first place?
Read MoreEver wondered why most systems can’t tell you what password you used when you signed up? Or wondered if your password was being stored insecurely by a service you were using? How can you even tell if it’s stored securely, and what does that mean?
Read MoreNobody wants to believe they can become a victim of a phishing attack. After all, you’re smarter than that, right? The truth is that even smart people fall for them, and phishing attacks are on the rise as a result. However, the tactics they use have changed in the last year or so. When phishing…
Read MoreCloud services can be a great solution. You can get storage and software without worrying about constant upgrading and replacing local software and even hardware. But with any cloud services, security is always a concern.
Read MoreWhen it comes to cybersecurity, passwords are inherently part of the problem. Whether yours are complex and easy to forget, short and easy for hackers to guess, or you write them down on a piece of paper that you end up losing, they cause a lot of issues.
Read MorePhishing attacks have been on the rise for many years now. Just as technology adapts to the attacks, the attackers continue to adapt to the technology, trying newer and more effective phishing methods on a regular basis.
Read MoreFor years now we’ve advised clients to use a password manager. It’s a much better option than scribbling your passwords down on tiny pieces of paper or even storing them in your web browser. Simply put, a password manager makes it easy to remember your secure passwords. You can even share passwords with other people on your team. But are password managers really secure? Only if you pick the right option.
Read MoreWith all the data today’s computers and phones have on them, they need to be properly secured. After all, you’re walking around with a device that can access your social media, email, and even bank accounts. Do you really want to risk someone stealing your identity because your phone wasn’t properly secured? So which one should you use, a password or your fingerprint?
Read MoreWe’ve talked about how ransomware works previously. It should be a concern for all small and medium-sized business owners. But what if you’ve already been infected? Should you just pay the ransomware demands or not?
Read More