Fileless malware: Are you at risk?

Fileless malware: Are you at risk?

Over the past few years, the security industry has been witnessing a rapid evolution in attack techniques, including fileless malware, which uses legitimate tools and services such as existing software, applications, and authorized protocols to carry out malicious activities such as unauthorized data retrieval or data damage. It therefore pays to stay abreast of such […]

Fight mobile malware with MTD

Fight mobile malware with MTD

Cybercriminals will do almost anything to steal your data. One of the easiest ways to do that is exploiting vulnerabilities in your employees’ mobile devices. If you’re looking for a way to beef up your security strategies, adopting mobile threat detection (MTD) is a good place to start. MTD and machine learning Mobile threat detection […]

Are autocomplete passwords safe?

Are autocomplete passwords safe?

Advertisements and suggestions based on our internet browsing habits are sources of online tracking. However, autocomplete passwords are also another source of online tracking. This sneaky tactic comes with serious security risks. Here’s how you can stop it from targeting you. Why auto-fill passwords are so dangerous As of December 2018, there are 4.1 billion […]

Is the IoT a boon or a bane in healthcare?

Is the IoT a boon or a bane in healthcare?

The rule of cybersecurity states that anything that connects to the internet can be hacked. With the increasing popularity of Internet of Things (IoT) in the healthcare industry, every business should be on alert. Devices that contain a treasure trove of patient data are attractive targets for cybercriminals. Healthcare apps, for instance, contain plenty of […]

Security tips for your IoT devices

Security tips for your IoT devices

Major companies like Google, Apple, and Microsoft are investing a lot of money in the Internet of Things (IoT). But just like any other technological trend, it comes with minor bugs and setbacks. Because of the diversity in IoT, developers have yet to develop large-scale security solutions. In the meantime, here are some things you […]

Reasons to back up your mobile devices

Reasons to back up your mobile devices

Companies such as Apple, Samsung, and others have turned mobile phones into mini-computers that can serve as a substitute for your laptop, or as a storage device. If you’re using a smartphone as a communications and storage device, backing up now would be a wise move. Malware on mobile More than two-thirds of the world’s […]

When Microsoft stops supporting Windows

When Microsoft stops supporting Windows

Microsoft only supports each version of Window for a certain period and the end of its support for a software product can be a significant challenge for businesses. Currently, Windows 7 is on “extended support” until January 14, 2020. What does it mean when Microsoft terminates support of your Windows version? Let’s have a closer […]

The lowdown on cloud security

The lowdown on cloud security

If you’re thinking of transitioning your business to the cloud, consider the security of the platform. While providers would like us to believe that the friendly, fluffy cloud image used to market the service means it is automatically secure, the reality is far different. Just ask one of the nearly seven million Dropbox users who […]

The benefits of technology business reviews

The benefits of technology business reviews

Small- and medium-sized businesses don’t have the time to maintain IT infrastructure, let alone assess whether it’s still driving value for the company. However, if you want to ensure everything runs smoothly, it’s important to be proactive and conduct technology business reviews when you can. What is a technology business review? A technology business review […]

Secure your Mac computer in 6 easy ways

Secure your Mac computer in 6 easy ways

If you’re a Mac user, data privacy and security should be your #1 priority. Without the right security measures, you’re inviting cybercriminals to steal your critical data. Are you willing to take the risk? Secure your computer and fortify your defenses with these six tips.  The basics First, let’s start with the basics and head […]