What are 2-step and 2-factor authentication?

What are 2-step and 2-factor authentication?

In the digital age, cybersecurity should be one of the top priorities for anyone who goes online. One way is to vet those who are trying to access your systems. But when it comes to verifying users’ identity, many are unaware of the two kinds of authentication measures available. Read on to know the differences […]

It’s time to rethink your password

It’s time to rethink your password

In 2003, a manager at the National Institute of Standards and Technology (NIST) authored a document on password best practices for businesses, federal agencies, and academic institutions. More recently, however, the institute has reversed its stance. Find out why and what great passwords are made of. The problem The issue isn’t necessarily that the NIST […]

Keep your Mac safe from cyberthreats

Keep your Mac safe from cyberthreats

Apple-related cyberthreats usually come from one of two people: someone who has physical access to your Mac, or someone who has virtual access over an unsecured network connection. Fortunately, protecting your Mac is a fairly simple process. Let’s take a look at what it entails.

5 ways to protect your IoT devices

5 ways to protect your IoT devices

Internet of Things (IoT) devices have become more popular with businesses in recent years. This is largely because they can keep track of large amounts of information, analyze data patterns, and streamline business processes. But as you introduce more internet-connected devices into the office space, you may be exposing your business to attacks. Set passwords […]

Cloudbleed: Your data could be at risk

Cloudbleed: Your data could be at risk

Cloudflare, an internet security services company, found a major bug in its software that leaked sensitive data like cookies and passwords from client websites. Although investigation into the security flaw, also known as Cloudbleed, is still underway, early reports found that malicious hackers have not exploited this vulnerability. Even still, you should know what you’re […]

Is two-step authentication the only way?

Is two-step authentication the only way?

When it comes to protecting yourself and your business online, the type of authentication you use for logins, whether for business or for personal use, is vitally important. While many people understand that secure logins are crucial, the differences between the various security measures may be lost on many people. Before you give up on […]

Keep your Dropbox secure

Keep your Dropbox secure

In 2012, cloud storage firm Dropbox was hacked with over two-thirds of its users’ details dumped all over the internet. While the company initially thought a collection of email addresses was the only thing stolen, it was wrong — passwords had been compromised as well. This new information came to light when the database was […]

Firefox’s 8 hidden function upgrades

Firefox’s 8 hidden function upgrades

In today’s modern day and age, the term “upgrade” has become associated with everything from hotel rooms to web browsers. It usually implies “better,” and who wouldn’t want that? After returning from a brief break, the web browser debuted its arsenal of upgraded functions — 8 to be exact — that helps make every browsing […]

The true story of an SMB attacked by hackers

When it comes to the online security of their business, many SMB owners consider it an afterthought. They think their business is too small to be of any concern to cyber criminals, and there’s good reason for this mentality. How often are security breaches to SMBs listed in the news? Rarely. In fact, you may […]