Humans are always trying to improve security protocols that can protect against increasingly advanced online threats. Unfortunately, the threats only grow stronger in response, and the war against malicious online activity rages on. Biometrics are security measures that are growing in popularity, but are expensive and difficult to integrate. Now, the US military is funding a campaign to make it more readily available to end users.

Published in Security

One would assume that software preinstalled on a new PC is secure and has been properly vetted by the manufacturer. This is the case 99 percent of the time, but an exception has recently been discovered with the Superfish app, which came installed on new Lenovo computers sold between September and December of 2014. How can you protect your PC from this fishy security threat?

Published in Alerts

Probably one of the more dangerous hacks so far in 2015, healthcare-provider Anthem has been breached by hackers and its data accessed. The breach may have provided the hackers with up to 80 million sensitive customer records, including Social Security numbers, dates of birth, and much, much more.

Published in Security

Have you tried online dating? There are many happy couples who attribute their love to the matchmaking algorithm of an online website. Internet dating is a legitimate option for modern singles, but like most good things on the web, naive users run a risk of getting scammed.

Published in Security

With the Internet of Things fast approaching, and BYOD becoming prevalent in the business world, there are a lot more devices connecting to wireless networks now than at any time in history. This makes new technology far more mobile, but it also means that more threats are able to access networks from countless new entry points. These threats can access your business’s devices which contain sensitive corporate data. How can you protect your devices from this wave of new threats?

Published in How To

Email has revolutionized the way we communicate, but in some cases it can be a dangerous distraction to productivity. This is especially true if your company is trying to maintain its own Exchange mail server. Does having email on the brain give you a headache? If so, you might consider looking into a hosted email Exchange solution.

Published in Technology

Cloud computing has taken the business world by storm, but despite this, some entrepreneurs aren’t so convinced that migrating their data to the cloud is a good idea. These business owners usually make this decision based off of misconceptions surrounding the cloud, which might be preventing them from making full use of it. Here are two of the most common misconceptions surrounding the cloud.

Published in Cloud

People dial 911 when they’re in some sort of trouble or in the event of an emergency. If not for the hotline, who knows how many lives could be lost daily. Sometimes, however, help doesn’t come, even when dispatchers have received the call and responded. This generally isn’t the fault of the dispatchers, but rather the criminals who have undermined the rescue efforts thanks to some unorthodox hacking.

Published in Security
Friday, 09 January 2015 06:15

3 Ways to Bring the Fight to Bots

The Internet is up to its ears with threats and hackers, but some of the most annoying malicious entities are bots. These are systems which can gather information from all kinds of sources. While some aren’t malicious in nature (think SEO bots which gather data from websites), there are those that aren’t so innocent. These tend to fall into the hands of hackers and attempt to steal information or send spam.

Published in Security

This holiday season might leave technology and entertainment supergiant Sony with nothing but a big lump of coal in its stocking. In a high-profile hack, hackers continue to leak Sony’s employees’ sensitive information like Social Security numbers, passports, and even personal emails. This is obviously an issue for the company, but so is its lack of IT security, as shown by their passwords being stored in a folder named “Passwords.”

Published in Security
«StartPrev12345678910NextEnd»
Page 1 of 12
IBM Business Partner Badge Microsoft Badge ConnectWise Badge SonicWall Badge