Do you ever turn your computer off?

Security_Sep02_CAsk yourself this quick question: At the end of the day, do you turn your computer off or simply stand up and leave? If you were to ask this question to 10 people, you would likely not get all of them to agree on which is the best method. This is actually a common question, but one which is not as simple to answer as you might think.

4 steps to cloud file security

Security_Aug19_CAs we enter the era of cloud computing, it’s a sure thing that many users will be unsure of the security of the system they are using and the documents and files stored within. Truthfully, these systems are fairly secure but not 100% as there is still a chance of information being stolen.

USB device poses security threat

Security_Aug05_CWhile computer systems have undoubtedly changed the way we do business, there are downsides to this, with one of the biggest being security. It’s challenging to keep your systems completely secure, especially since new threats are uncovered on a near daily basis.

5 safety steps to online shopping

Security_July22_CHave you ever bought something online? There is something compelling about browsing an online store, filling a virtual cart, checking-out and having it arrive on your doorstep a few days later. E-commerce is quickly becoming one of the most popular forms of shopping, but like everything else on the Internet, there are security issues you could run into.

Android security flaw uncovered

Security_July08_CThe security of devices used in the office should be a top priority for business owners and managers. It is easy to think that a fully functioning device like a mobile phone is secure, and most of the time it is. The thing to be aware of however, is that there are always hackers looking for security flaws in these products.

NSA data collection exposed

Security_June26_CHong Kong is one of the busiest and freest cities on Earth. It also recently played host to one of the biggest whistleblowers in history – Edward Snowden. In early June, Snowden, an ex NSA (National Security Agency) consultant, exposed their data collection program, causing unparalleled uproar and controversy.

Five low cost security tips

Security_June12_CA common misconception among many business owners and managers is that managing the security of their systems and computers is a time-consuming and costly endeavor. While it certainly can be expensive, how much you spend really depends on the type of security you want and need.

Four password management systems

Security_May29_CThe password is the main way we identify ourselves online. We need these to access nearly every account and service we use. Hackers know this and often target this area. One way to minimize the chance of your accounts being hacked is by using different passwords for every account.

LivingSocial: 50 million accounts hacked

Security_May15_CThe Internet, still in its early phases, is seeing a dramatic increase in the number of users. Unfortunately, this growth has also seen an increase in the number of cyber criminals and attacks against websites. The latest major attack was perpetrated against LivingSocial.

Five password don'ts

Security_May02_CSecurity is an important issue for many business owners and managers. Many work with their IT department or an IT partner to ensure their network and systems are secure from threats. But what about your email, social media and bank accounts? The weakest link of these online accounts is your password, hackers know this and that’s what they target.