The dangers of autocomplete passwords

The dangers of autocomplete passwords

Hackers have found a new way to track you online. Aside from using advertisements and suggestions, they can now use autocomplete passwords to track you down. Feeling unsecure? Here are some ways to keep you out of harm’s way. Why auto-fill passwords are so dangerous As of December 2018, there are 4.1 billion internet users […]

Benefits of using a VPN

Benefits of using a VPN

While using a virtual private network or VPN isn’t a silver bullet to online privacy threats, it still offers crucial security benefits, especially if any part of your day involves using unsecured channels such as public Wi-Fi. Given its importance, how do you pick the right one and what factors do you need to consider? […]

PHI security best practices

PHI security best practices

Healthcare companies and the vast amount of valuable patient information they hold have become a major target of cyberattacks. Hospitals must combat this with a highly trained team of technicians equipped with the following technologies and security tools. Strict access policies To control access to protected health information (PHI), your IT department must introduce access […]

Mobile ransomware is coming for your Android

Mobile ransomware is coming for your Android

If malware infects your computer, it would either crash at random, display annoying ads or notifications, or slow down. An Android device that has been breached by malware will not immediately show any signs of infection, unless it’s ransomware. How does ransomware make it onto your Android device? Like its desktop equivalent, mobile ransomware needs […]

Keep your mobile devices safe with these tips

Keep your mobile devices safe with these tips

More businesses are now allowing their employees to use mobile devices to increase productivity and profitability. But smartphones and tablets are just as vulnerable to hacking as desktops and laptops. Worse, employees may be exposing their mobile devices unwittingly to cybercriminals. Here are some helpful tips to keep your devices safe. Ensure mobile OS is […]

Do honest working hackers exist?

Do honest working hackers exist?

The word “hacker” conjures up an image of a hoodie-wearing basement dweller that programs all sorts of malicious attacks to infiltrate their target’s computer. But hackers are so much more than that. There are also hackers that use their skills to do good. A complicated history In the 1950s, the term ‘hacker’ was vaguely defined. […]

Android mobile security threats today

Android mobile security threats today

As bring your own device (BYOD) policies become common practice for companies today, business owners must keep in mind the possible cybersecurity implications of connecting more devices to the company network. If your employees are using Android devices, here are the top five security threats they need to be aware of as well as how […]

Have you updated your firmware yet?

Have you updated your firmware yet?

You can find firmware everywhere, from a tiny networked LED light bulb to the biggest data center. This code is powerful because it controls the device it’s installed on. If your firmware is outdated, it can be used to spy on your environment, steal or corrupt your data, or even damage the system it’s controlling. […]

Avoid the pain – manage your passwords

Avoid the pain – manage your passwords

We’ve all heard that we should change our passwords on a regular basis and we should not use the same password for multiple accounts – but why?

Here is a good, real-life example that occurred recently (the name is changed to protect the guilty).

Jack thought that using multiple passwords was too bothersome, he had better things to do than try to figure out what password to use.

5 proactive defenses against cyberattacks

5 proactive defenses against cyberattacks

As IT security consultants, we’re stuck between a rock and a hard place. Managed IT services providers (MSPs) such as ours want to provide clients with enterprise-level IT, but that requires that we specialize in overwhelmingly intricate technology. Explaining even the most fundamental aspects of cybersecurity would most likely put you to sleep instead of […]