5 Easy tips for preventing data breaches

5 Easy tips for preventing data breaches

Keeping your personal and professional information safe from cybercriminals is not easy. It takes constant vigilance and frequent training. There are dozens of simple tools and tips to help people with almost zero expertise stay safe online, but these five are our favorites.

What are the risks of BYOD?

What are the risks of BYOD?

The bring your own device (BYOD) strategy lets employees use their personal mobile devices to do work for your company from anywhere. This strategy increases efficiency and convenience to your business, but it also brings a number of security risks to your IT infrastructure and data.

Beware of NetSpectre

Beware of NetSpectre

Cyberattacks continue to evolve at a worrying pace. Just when you think one security threat has been fixed, a more dangerous version of that threat is discovered. One such threat is Spectre and it’s more recent variant, NetSpectre. Read on to learn more.

Security policies for your business

Security policies for your business

Businesses rarely address cybersecurity in their company policies. With cybercrimes becoming more prevalent, it’s important you inform staff about the threats they could be exposed to. Make sure your business and employees are safe with these security policies.

Assess risks before buying new software

Assess risks before buying new software

The growing market for cybersecurity products is a sign that businesses are taking the issue seriously. But before your company jumps into investing in any product, ask yourself if it’s really necessary. Find out how you can make the most out of cybersecurity products by conducting a risk assessment.

SMB routers targeted by VPNFilter malware

SMB routers targeted by VPNFilter malware

Earlier this year, news broke that a malware strain named VPNFilter was infecting hundreds of thousands of devices. If you didn’t act then, now’s the time. Security experts have updated their threat assessment and its much worse than they originally thought.

Chrome: From HTTP to HTTPS

Chrome: From HTTP to HTTPS

Within the last year, Chrome has helped users understand that HTTP sites are not secure. More websites use HTTPS, a safer protocol, than ever before. So, how can you benefit from this transition? Find out here.

For several years, Google has moved toward a more secure web by strongly advocating that sites adopt the Secure HyperText Transfer Protocol (HTTPS) encryption.

Office 365 will block Flash by 2019

Office 365 will block Flash by 2019

Microsoft recently announced plans to eventually stop the activation of Silverlight, Shockwave, and Flash content in Office 365. This is not just the developers disabling bugs with an option to click a link or button to look at content. Within a few months’ time, Flash will be gone from Office 365 for good.

Mitigating healthcare insider threats

Mitigating healthcare insider threats

The healthcare industry is unique in that the biggest data security threat comes from insider breaches.The main reason for these unauthorized hacks is financial gain. So how can healthcare organizations protect themselves against insider threats? Read on.

Nation-state hackers inflict destructive malware

Nation-state hackers inflict destructive malware

A destructive, new malware has surfaced in at least 500,000 home and business routers across 54 countries. Security researchers warned that the infected devices could “self-destruct” as the said malware named VPNFilter can maintain presence even after a successful reboot.