5 tips to spot email fraud

Security_April18_CWhile being one of the most useful business tools ever invented, email can also be a hinderance. Because of its generally open nature, when anyone can get an email address, criminals have taken their operations online in the form of email frauds or scams.

Confused about computer viruses?

Security_April03_CMyths have always been a part of human culture, and can be found in nearly every aspect of life, including the computer. One of the larger computer-based myths revolves around malware, more specifically the virus. Many users are familiar with the concept but have a tough time distinguishing between what is true and what isn’t. Are you one of them?

Here are five common myths about viruses that confuse people, and the truths associated with them.

Docracy helps track Terms of Service

Security_March20_CThe Internet has seeped into nearly every aspect of our daily lives, it’s hard not to be connected these days. Think about the number of websites you have accounts with, and how all of these sites now have some form of personal information of yours. The question is, what exactly do these sites do with your information? The answer lies in the Terms of Service, which are always evolving and hard to keep track of.

Do you secure your private information?

Security_March06_CThe Internet has become ingrained in nearly everything we do. There are many people who are barely disconnected these days. While this development is great for companies, that arguably get more out of employees as a result, there is a downside. In general, people are more than willing to share their personal and private information online.

Prey tracks your important devices

Security_Feb20_CThe number of tech gadgets we own has been growing, as has the number of criminals targeting high value goods like laptops and smartphones. While it is more likely to not happen, there is still a chance your laptop or phone could be stolen or go missing.

Warning: 250 K Twitter accounts breached

Security_Feb13_CSocial media has become a large part of both individual users’ lives and company business. These platforms allow us to communicate with ease, while sharing information, and generally creating an interactive community. As with any group, security is an issue.

UPnP devices are a security risk

The security of a company’s networks and devices is a common issue many managers and owners face. There are a near constant stream of new threats brought to light, some of which are more important than others. The majority of the time these threats are to the software, but a recent one is hardware based and puts millions of systems at risk.

It's time to cut back on Java

Technology surrounding the Internet is constantly evolving. Many programs that helped allow the Internet expand and become what it is today are still in use. They stay relevant by issuing updates that often bring more functionality while meeting the evolving needs of Web developers and users.

Beware: Windows tech support scammers

Social engineering – the act of manipulating people into giving up confidential information – has long been a threat to businesses. One of the more common social engineering tricks, in terms of IT, is scammers posing as Windows technicians who call Windows users and try to trick them into believing their computers have viruses and that they need to pay to have the problem fixed.

5 parts of a secure social media strategy

Security of a company’s network and systems is big business. After all, you don’t want your sensitive important information shared or stolen. While you take steps to ensure your systems are secure, there is one area you can’t really control: social media.