multifactor authentic 96Time hasn’t been kind to the password. It’s continuously put down as one of the least secure methods of protecting systems. It’s not due to any fault of the password, though. People just have a hard time remembering long and complex passwords. To aid in security, it’s recommended that you use some sort of multi-factor authentication. While some users prefer easy SMS message two-factor authentication, there are actually many different types of multi-factor authentication available.

Published in IT Blog

b2ap3_thumbnail_eagles_for_drones_400.jpgWhile they might seem like glorified toys for adults, drones are fantastic tools that can help people take some breathtaking photos and videos of their local scenery. Unfortunately, as is the case with most good technology, there are people out there who want to use them for nefarious purposes. This leads authorities to a tough question: how do you knock an illegal or dangerous drone out of the sky without harming those down below? The answer is simple: eagles.

Published in Technology

b2ap3_thumbnail_hack_attack_400.jpgThere’s an intrusive malware on the Internet that locks a user out of their PC and directs them to a fake IT support phone number. In addition to being inconvenient, it can lead to the theft of sensitive information. If this happens to you, whatever you do, don’t call the fake phone number.

Published in Alerts

b2ap3_thumbnail_use_the_content_filter_400.jpgWith so much nasty content just begging to get viewed on the Internet, it’s understandable why a content filter needs to be integrated into your company’s web viewing protocol. Still, it should be understood that your content filter isn’t going to keep all questionable content away from prying eyes. Therefore, the only way you can really know with certainty that your Internet users aren’t doing anything sketchy is to actively monitor their activity, and check for any suspicious websites.

Published in Best Practices

b2ap3_thumbnail_why_not_windows_10_400.jpgWe all know that Windows 10 is the hot new operating system released by Microsoft this past July, with slick new features and (gasp!) the Start menu. We’ve been writing a lot of articles about how great and functional the new operating system is. Keep in mind that Windows 10 is a great operating system, but you should also take note of these four shortcomings when considering whether you should immediately upgrade or not.

Published in Miscellaneous

b2ap3_thumbnail_car_hack_400.jpgSince the dawn of the computing age, hackers have taken advantage of all sorts of tactics in order to crack systems and ruin lives. With the Internet of Things bringing connected devices from all over the place into the mix, there are more opportunities than ever to take advantage of unsuspecting users. In fact, even car computers are capable of being hacked.

Published in Security

b2ap3_thumbnail_hacker_vs_hacker_400.jpgNormally in cybersecurity, we hear about hacking attacks and immediately sympathize with the victim. It’s usually an individual or a business that suffers the most; yet, a recent trend is showing that hackers are lashing out at one another in response to certain threats. In response to a hack from the cyberespionage group Naikon, another group, Hellsing, retaliated with their own attack.

Published in Security
Wednesday, 15 April 2015 10:05

Tip of the Week: How to Pick a Secure PIN

b2ap3_thumbnail_pin_tips_400.jpgHow much thought have you put into selecting your debit card PIN? If you’ve not put any thought into your PIN, then it’s likely the case that you’ve picked a number that’s easy to remember or even one that’s associated with something personal. Fact: Taking time to pick random and hard-to-remember numbers greatly improves PIN security.

Published in How To

b2ap3_thumbnail_password_security_400.jpgChanging your password is a pain. After you’ve gone several months with the same one, it can be difficult to remember your new password. Despite this, it’s always recommended that you change your passwords often. Unfortunately, when you change all of your passwords often, it’s even easier to forget them. Instead of using a post-it note on your monitor, you should instead try using a password manager.

Published in Security

Humans are always trying to improve security protocols that can protect against increasingly advanced online threats. Unfortunately, the threats only grow stronger in response, and the war against malicious online activity rages on. Biometrics are security measures that are growing in popularity, but are expensive and difficult to integrate. Now, the US military is funding a campaign to make it more readily available to end users.

Published in Security
«StartPrev123456NextEnd»
Page 1 of 6
IBM Business Partner Badge Microsoft Badge ConnectWise Badge SonicWall Badge