3007, 2019

A primer on watering hole attacks

By |July 30, 2019|Categories: Security|Tags: , , , , , , |

Cyberattacks come in many different forms, with new methods being developed all the time. What’s bad is that personal information is now often stored online, be it through social media or through government and healthcare services — and these are juicy targets for criminals. Learn more about one way these [...]

2204, 2019

Boost your new laptop in 5 steps

By |April 22, 2019|Categories: Hardware|Tags: , , , , , , , , |

Laptops may not be the most powerful computers, but the benefits they provide are undisputable. For one thing, they deliver a similar user experience as your huge desktop PC, but much more conveniently and affordably. But before you reap their many benefits, here are five steps you should take before [...]

1302, 2019

The dangers of the web and how to stay safe

By |February 13, 2019|Categories: Web & Cloud|Tags: , , , , , , , , , , |

You probably go to great lengths to keep yourself safe, whether at home or in public. But what happens when you get online? Learn more about how you could be exposing yourself and your personal information over the internet so you can stay safe. With the headlines about data breaches [...]

801, 2019

VPNs: Why you need them

By |January 8, 2019|Categories: Security|Tags: , , , , , , , |

Installing antivirus software and setting strong passwords are no longer considered the bare minimum in cybersecurity. With hackers, third parties, and ISPs constantly monitoring networks and your online habits, hopping onto a virtual private network (VPN) is crucial for keeping your surfing habits private. Here’s why. What is a VPN? [...]

1710, 2018

How to prevent VoIP threats

By |October 17, 2018|Categories: VoIP|Tags: , , , , , |

Now that digital collaboration is an integral part of any business, VoIP has become indispensable. Unfortunately, as it becomes more widespread, so do the threats against it. These attacks may not be as serious as ransomware or phishing, but they’re just as dangerous to SMBs. Here are five ways to [...]

1704, 2018

Beware of watering hole attacks!

By |April 17, 2018|Categories: Security|Tags: , , , , , , |

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack. What are watering [...]

2703, 2018

Can private browsing keep you safe?

By |March 27, 2018|Categories: Web & Cloud|Tags: , , , , , , , , , , |

Privacy is a precious commodity in this era. Every website you visit or app you download leaves a digital footprint that can be tracked by anyone. Fortunately, major web browsers all offer private browsing features to keep your internet activity somewhat safe from prying eyes. What is private browsing? Your [...]

602, 2018

5 things to do to your new laptop

By |February 6, 2018|Categories: Hardware|Tags: , , , , , , , , |

Getting a new laptop can be very exciting. It guarantees a more seamless user experience with faster speed, more memory, and better battery life. But it’s all for naught if you don’t take certain preventive steps before using your new machine. Discover five things you should do before you start [...]

612, 2017

Cybersecurity Essentials: VPN

By |December 6, 2017|Categories: Security|Tags: , , , , , , , |

Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN). What is VPN? Simply put, [...]

211, 2017

KRACK hacks: What you need to know

By |November 2, 2017|Categories: Security|Tags: , , , , , , , , |

You’ve heard of ransomware, denial-of-service attacks, and even phishing, but one hacking technique you may not have heard of is the KRACK exploit. This attack takes advantage of a vulnerability in WiFi networks, which puts any device with a wireless connection at risk. Here’s everything you need to know about [...]

Go to Top