The difference between 4 types of malware

The difference between 4 types of malware

Since many of us out there have been using the internet for decades, it’s likely that most of us have had our systems infected by malware at one point or another. But how many of us actually know what the differences are between malware, viruses, trojans, and other online threats? For those without a clue, here’s a description of four of the most common ones and the security measures you can take to keep your business protected.

Google holds the key to Drive security

Google holds the key to Drive security

Data breaches are all too common and, without adequate protection, every business is at risk of external attack. In fact, it’s never been more important to ensure your organization’s policies and procedures are foolproof, and that you have contingency plans in place should something go wrong.

5 cloud security measures you need to take

5 cloud security measures you need to take

If you’re considering transitioning your business to the cloud, have you considered the security of the platform? While providers would like us to believe that the friendly fluffy cloud image used to market the service means it is automatically secure, the truth is that the reality is far different.

Securing your company’s data

Securing your company’s data

There have been many security breaches to big-name companies over the past few years – eBay, Adobe, Home Depot, and Sony Pictures to name a few. While large enterprises are primary targets for hackers, small and medium-sized businesses are also vulnerable, and therefore need to arm themselves against data security threats.

Remove a virus from your Android device

Remove a virus from your Android device

We all know that computers can get infected with viruses, but did you know that your phone or tablet can as well? Yes, it is in fact true. And just because you have a new fancy Android device, doesn’t mean you’re immune. So if your phone or tablet starts acting funny and you suspect a virus is responsible, it’s time to take action with these six steps.

Enhanced sign-in security for Venmo

Enhanced sign-in security for Venmo

With the threat of sophisticated intrusion on the rise, there has never been a more important time to be vigilant about IT security. Whether it’s selecting a difficult-to-guess password and then changing it frequently, or remembering to properly log out of social networking sites when using a shared computer, there are plenty of simple steps we can all take to better protect ourselves online.

How Apple made FaceTime and iMessage safer

How Apple made FaceTime and iMessage safer

We have become acclimatized to ever-present threats to the security of the information and files we share and store online. But we all still want our data to be as secure as possible and, following high-profile breaches such as the celebrity photo leaks of 2014, if anything the issue of online security is even more prominent in our minds.