811, 2018

Outdated firmware: An overlooked threat

By |November 8, 2018|Categories: Hardware|Tags: , , , , , , , |

If most of your company’s computers are obsolete, they double or even triple your chances of experiencing a data breach. This emphasizes how dangerous it is to have outdated applications, operating systems, and even web browsers. Failing to update your firmware could expose your business to major security threats. What [...]

2302, 2018

Protect your Mac from security threats

By |February 23, 2018|Categories: Apple|Tags: , , , , , , , , , |

Mac users follow certain steps to maintain privacy and protect company data. But if you're too busy or short on resources, you might place security lower on your to-do list. Whatever your reason, the threat is real and you need to take steps to protect yourself. Check your Privacy Settings [...]

2407, 2017

How to secure your IoT devices

By |July 24, 2017|Categories: Hardware|Tags: , , , , , , , , |

More firms are using the Internet of Things (IoT) to create new business opportunities. For instance, companies that install smart sensors can automate data entry and monitor their inventory. However, if left unsecured, IoT devices also give hackers an opportunity to breach your network. In order to keep attackers at [...]

2706, 2017

Wikileaks details router vulnerabilities

By |June 27, 2017|Categories: Security|Tags: , , , , , , , |

When we write about how antivirus software isn’t enough to keep you safe from malware, it’s not just scare tactics. There are so many ways hackers can break into your system that antivirus solutions will never catch. For a real-world example, look no further than the router exploit kit recently [...]

1804, 2017

Firmware: the threat most users overlook

By |April 18, 2017|Categories: Hardware|Tags: , , , , , |

For decades, one of the most foundational principles of cyber security has remained the same: Always update and patch your software. But for most people, hardware is exempt from this process. They think of hardware as nothing more than a vessel for software to occupy -- and that’s totally incorrect. [...]

Go to Top