Security & Privacy

December 9, 2019

Online Holiday Scams & How to Protect Your Data

December is the busiest shopping month of the year with several gift giving holidays within. Companies send out more email volume during this time to past […]
November 18, 2019

Using Galaxy S10 or Note10? Be Sure to Install the Biometric Update

The Galaxy S10, S10+, S10 5G, Note10, and Note10+ smartphones have a flaw that allows any fingerprint to unlock the devices when certain screen protectors are […]
November 14, 2019

CCleaner: A Tale of Two Attacks

CCleaner has been the target of hackers twice in the last three years. Here are several lessons that you can learn from these attacks. CCleaner — […]
October 28, 2019

5 Things You Should Know about Phishing

The more you know about phishing, the better you will be able to spot phishing attacks. Here are five phishing fundamentals that can help you avoid […]
October 24, 2019

Firefox Mozilla Beta Testing VPN Service

Firefox is testing an extension for browser users that will allow encryption when browsing websites to create a better and secure experience for the user. After […]
October 21, 2019

Gift Card Payouts: A New Trend in Business Email Scams

Cybercriminals are increasingly conning companies into sending gift-card numbers and PINs. Learn about this new trend in business email compromise (BEC) scams and what you can […]
October 14, 2019

Using Strong Passwords Is Not Always Enough to Prevent Cyberattacks

Using unique, strong passwords is not always enough to prevent hackers from attacking your company. Learn about a better way to protect your online accounts and […]
September 19, 2019

How to Protect Your Sensitive Business Files with Passwords

Protecting a file with a password can provide an extra layer of security for sensitive business documents. Learn how to password-protect your files in Microsoft Word, […]
September 16, 2019

Critical Security Vulnerability Allows Hackers to Take Over Cisco Routers

A severe security vulnerability in several types of Cisco routers allows cybercriminals to gain full control of the devices. Discover which routers are affected and what […]