Security

Our Blog

September 15, 2020 / Security

Benefits of using a VPN

While using a virtual private network or VPN isn’t a silver bullet to online privacy threats, it still offers crucial security benefits, especially if any part of your day involves using unsecured channels such as public Wi-Fi. Given its importance, how do you pick the right one and what factors do you need to consider? What is a VPN? The best way to describe a VPN is as a secure...

Read More
September 4, 2020 / Security

The dangers of autocomplete passwords

Hackers have found a new way to track you online. Aside from using advertisements and suggestions, they can now use autocomplete passwords to track you down. Feeling unsecure? Here are some ways to keep you out of harm’s way. Why autocomplete passwords are so dangerous As of December 2018, there are 4.1 billion internet users in the world. This means users have to create dozens of passwords, either to protect...

Read More
April 30, 2020 / Security

Monitoring employees online: Is it right?

The choice to monitor your employees’ computers or not is a tricky one. While part of you may think it’s unethical, it could end up saving you hours of lost productivity or preventing a data breach. Here are some pros and cons of employee monitoring, and some tips to handle it fairly if you decide it’s right for your business. The case for monitoring There are a number of reasons...

Read More
April 30, 2020 / Security

A closer look at fileless malware

To avoid detection by antimalware programs, cybercriminals are increasingly abusing legitimate software tools and legitimate programs in systems to steal data or ruin its integrity. They use fileless malware to infiltrate trusted applications and issue executables that blend in with normal network traffic or IT/system administration tasks while leaving fewer footprints. Ultimately, your business could be at risk. Let’s see why. What is fileless malware? Fileless malware is stored in...

Read More
April 30, 2020 / Security

Top security threats to financial services

Hackers go for the gold. This means that banking information makes for the number one target. These cyberattacks (and other top security threats) lead to the theft of large sums of money, undermine the economic stability of individuals and organizations, as well as destroy the reputation of banks and other financial institutions. When these incidents occur, the damage can be irreversible and substantial. As such, business owners should learn about...

Read More
April 30, 2020 / Security

It’s time to rethink your password

In 2003, a manager at the National Institute of Standards and Technology (NIST) authored a document on password best practices for businesses, federal agencies, and academic institutions. More recently, however, the institute has reversed its stance. Find out why and what great passwords are made of. The problem The issue isn’t necessarily that the NIST advised people to create passwords that are easy to crack, but it steered people into...

Read More
Show More