Security & Privacy

July 25, 2017

How to Replace Weak Passwords with Strong Ones

Many websites and online services have users sign in to their account with an email address-based username. While this makes it easier for people to remember […]
July 25, 2017

How the Internet of Things Is Changing Cybersecurity

The Internet has radically changed society over the last few decades. It will continue to shake things up in the years to come as consumers are […]
July 3, 2017

7 Ways to Secure Your Smartphone

Smartphones are so small and portable that it is easy to forget that you have a powerful computer in your pocket or purse. However, they are […]
June 27, 2017

How to Protect Your IoT Devices from Malware Designed to Destroy Them

Hackers have unleashed a new kind of malware that damages the systems of Internet of Things (IoT) devices so extensively the devices become useless. The malware […]
May 29, 2017

Defending Against Cybersecurity Threats in Your Hotel Room

Being on the road is typically a stressful affair. Travelers have to worry about making their flight connections or booking reservations to a hotel or restaurant. […]
May 15, 2017

6 Ways to Make Your IT Security Training More Effective

Cybercriminals like to target the weakest link in companies’ security defenses — and that link is often the employees. But it does not have to be […]
May 15, 2017

Don’t Let Your Business Become the Next Spear Phishing Victim

Spear phishing scams targeted at businesses have proven to be very lucrative for cybercriminals. For example, since January 2015, hackers have stolen over $3 billion (USD) […]
May 4, 2017

The Dangers Lurking When Employees Use Work Email Addresses for Personal Use

Many companies likely have had their email credentials compromised without realizing it. In September 2016, researchers revealed that they found about 5 million unique business email […]
May 4, 2017

How to Set Up Two-Step Verification for Your Google Account

As the series of massive Yahoo! data breaches demonstrate, having a strong password is not always sufficient. Cybercriminals can hack into companies’ databases and steal customers’ […]