2310, 2019

Better internet security: Easy as 1, 2, 3

By |October 23, 2019|Categories: Security|Tags: , , , , , , , , , , , |

The internet is not such a bad place to be in — for as long as website owners do their share in keeping it safe for their visitors. Here are three tips to do exactly just that.

2802, 2019

Why is HTTPS important?

By |February 28, 2019|Categories: Web & Cloud|Tags: , , , , , , , , , |

Many internet users still do not understand what the padlock icon in their web browser’s address bar is for. It represents HTTPS, a security feature that authenticates websites and protects the information users submit to them. This is an important feature that lets users know whether the site they are [...]

709, 2018

5 Cybersecurity measures anyone can master

By |September 7, 2018|Categories: Security|Tags: , , , , , , , , |

Avoiding malware and online scams takes a lot of work. You have to treat every email with suspicion, manage a long list of convoluted passwords, and avoid public WiFi networks. Ideally, you follow several other cybersecurity best practices, but many users don’t believe they’re worth the time. If you’re one [...]

1406, 2018

Chrome to mark HTTP as ‘not secure’

By |June 14, 2018|Categories: Google, Security, Web & Cloud|Tags: , , , , , , , , , , , , , |

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as "not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the forthcoming changes. For several [...]

703, 2018

The importance of HTTPS

By |March 7, 2018|Categories: Web & Cloud|Tags: , , , , , , , , , |

Very few internet users understand the meaning of the padlock icon in their web browser’s address bar. It represents HTTPS, a security feature that authenticates websites and protects the information users submit to them. Let’s go over some user-friendly HTTPS best practices to help you surf the web safely. HTTPS [...]

2212, 2017

Phishers use encrypted sites to scam

By |December 22, 2017|Categories: Security|Tags: , , , , |

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of [...]

211, 2017

KRACK hacks: What you need to know

By |November 2, 2017|Categories: Security|Tags: , , , , , , , , |

You’ve heard of ransomware, denial-of-service attacks, and even phishing, but one hacking technique you may not have heard of is the KRACK exploit. This attack takes advantage of a vulnerability in WiFi networks, which puts any device with a wireless connection at risk. Here’s everything you need to know about [...]

1407, 2016

5 simple but manageable security measures

By |July 14, 2016|Categories: Security|Tags: , , , , , |

Don't be put off by the tech jargon of security experts you find in forums and self-help books. A managed service provider is what you need to break down complex security ideas into easy-to-understand language. However, they generally focus on installing and managing protection software that's often far too complicated [...]

Go to Top