NSA data collection exposed

Security_June26_CHong Kong is one of the busiest and freest cities on Earth. It also recently played host to one of the biggest whistleblowers in history – Edward Snowden. In early June, Snowden, an ex NSA (National Security Agency) consultant, exposed their data collection program, causing unparalleled uproar and controversy.

Five low cost security tips

Security_June12_CA common misconception among many business owners and managers is that managing the security of their systems and computers is a time-consuming and costly endeavor. While it certainly can be expensive, how much you spend really depends on the type of security you want and need.

Four password management systems

Security_May29_CThe password is the main way we identify ourselves online. We need these to access nearly every account and service we use. Hackers know this and often target this area. One way to minimize the chance of your accounts being hacked is by using different passwords for every account.

LivingSocial: 50 million accounts hacked

Security_May15_CThe Internet, still in its early phases, is seeing a dramatic increase in the number of users. Unfortunately, this growth has also seen an increase in the number of cyber criminals and attacks against websites. The latest major attack was perpetrated against LivingSocial.

Five password don'ts

Security_May02_CSecurity is an important issue for many business owners and managers. Many work with their IT department or an IT partner to ensure their network and systems are secure from threats. But what about your email, social media and bank accounts? The weakest link of these online accounts is your password, hackers know this and that’s what they target.

5 tips to spot email fraud

Security_April18_CWhile being one of the most useful business tools ever invented, email can also be a hinderance. Because of its generally open nature, when anyone can get an email address, criminals have taken their operations online in the form of email frauds or scams.

Confused about computer viruses?

Security_April03_CMyths have always been a part of human culture, and can be found in nearly every aspect of life, including the computer. One of the larger computer-based myths revolves around malware, more specifically the virus. Many users are familiar with the concept but have a tough time distinguishing between what is true and what isn’t. Are you one of them?

Here are five common myths about viruses that confuse people, and the truths associated with them.

Docracy helps track Terms of Service

Security_March20_CThe Internet has seeped into nearly every aspect of our daily lives, it’s hard not to be connected these days. Think about the number of websites you have accounts with, and how all of these sites now have some form of personal information of yours. The question is, what exactly do these sites do with your information? The answer lies in the Terms of Service, which are always evolving and hard to keep track of.

Do you secure your private information?

Security_March06_CThe Internet has become ingrained in nearly everything we do. There are many people who are barely disconnected these days. While this development is great for companies, that arguably get more out of employees as a result, there is a downside. In general, people are more than willing to share their personal and private information online.

Prey tracks your important devices

Security_Feb20_CThe number of tech gadgets we own has been growing, as has the number of criminals targeting high value goods like laptops and smartphones. While it is more likely to not happen, there is still a chance your laptop or phone could be stolen or go missing.