1403, 2019

New security features for your Android device

By |March 14, 2019|Categories: Android|Tags: , , , , |

Mobile devices can be considered an extension of ourselves, containing personal information like web browsing behavior, email exchanges, bank transactions, and other private data. Losing your smartphone or having it stolen is a nightmare, but the good news is that Android devices have security tools you can use to keep [...]

503, 2019

Think twice about selling or donating a Mac

By |March 5, 2019|Categories: Apple|Tags: , , , , , , , , , , |

Today’s computer users often forget or are unaware of how much sensitive information their devices store. The ability to save passwords, credit card numbers, and personal messages is undeniably convenient, but it’s also a huge liability. If you’re thinking about getting rid of your Mac, make sure to follow these [...]

2802, 2019

Why is HTTPS important?

By |February 28, 2019|Categories: Web & Cloud|Tags: , , , , , , , , , |

Many internet users still do not understand what the padlock icon in their web browser’s address bar is for. It represents HTTPS, a security feature that authenticates websites and protects the information users submit to them. This is an important feature that lets users know whether the site they are [...]

2002, 2019

Recover your privacy in Windows 10

By |February 20, 2019|Categories: Windows|Tags: , , , , , , |

Advertisers are able to target their consumers more effectively thanks to social media. But did you know that your operating system might also be giving away information about your online searches to advertising agencies? Learn more about Windows 10's not-so-private settings and how these can be fixed. Turn personalized advertising [...]

1902, 2019

Fileless malware: Are you at risk?

By |February 19, 2019|Categories: Security|Tags: , , , , , |

Over the past few years, the security industry has been witnessing a rapid evolution in attack techniques, including fileless malware, which uses legitimate tools and services such as existing software, applications, and authorized protocols to carry out malicious activities such as unauthorized data retrieval or data damage. It therefore pays [...]

1302, 2019

The dangers of the web and how to stay safe

By |February 13, 2019|Categories: Web & Cloud|Tags: , , , , , , , , , , |

You probably go to great lengths to keep yourself safe, whether at home or in public. But what happens when you get online? Learn more about how you could be exposing yourself and your personal information over the internet so you can stay safe. With the headlines about data breaches [...]

802, 2019

Fight mobile malware with MTD

By |February 8, 2019|Categories: Android|Tags: , , , , , , , |

Cybercriminals will do almost anything to steal your data. One of the easiest ways to do that is exploiting vulnerabilities in your employees’ mobile devices. If you’re looking for a way to beef up your security strategies, adopting mobile threat detection (MTD) is a good place to start. MTD and [...]

3101, 2019

Are autocomplete passwords safe?

By |January 31, 2019|Categories: Security|Tags: , , , , , , , , , , |

Advertisements and suggestions based on our internet browsing habits are sources of online tracking. However, autocomplete passwords are also another source of online tracking. This sneaky tactic comes with serious security risks. Here’s how you can stop it from targeting you. Why auto-fill passwords are so dangerous As of December [...]

1701, 2019

Single Sign-On: The key to user management

By |January 17, 2019|Categories: Web & Cloud|Tags: , , , , , , , , |

Making passwords can be tedious. From complexity requirements to minimum lengths, creating a password for each new account brings its own set of headaches. If this problem is reaching a boiling point, Single Sign-On (SSO) solutions can help. These techniques are secure, easy-to-manage, and do away with the need to [...]

Go to Top