Warning: 250 K Twitter accounts breached

Security_Feb13_CSocial media has become a large part of both individual users’ lives and company business. These platforms allow us to communicate with ease, while sharing information, and generally creating an interactive community. As with any group, security is an issue.

UPnP devices are a security risk

The security of a company’s networks and devices is a common issue many managers and owners face. There are a near constant stream of new threats brought to light, some of which are more important than others. The majority of the time these threats are to the software, but a recent one is hardware based and puts millions of systems at risk.

It's time to cut back on Java

Technology surrounding the Internet is constantly evolving. Many programs that helped allow the Internet expand and become what it is today are still in use. They stay relevant by issuing updates that often bring more functionality while meeting the evolving needs of Web developers and users.

Beware: Windows tech support scammers

Social engineering – the act of manipulating people into giving up confidential information – has long been a threat to businesses. One of the more common social engineering tricks, in terms of IT, is scammers posing as Windows technicians who call Windows users and try to trick them into believing their computers have viruses and that they need to pay to have the problem fixed.

5 parts of a secure social media strategy

Security of a company’s network and systems is big business. After all, you don’t want your sensitive important information shared or stolen. While you take steps to ensure your systems are secure, there is one area you can’t really control: social media.

Is admin access really necessary?

A common expectation of the younger generation entering the workforce is that the technology they use is unrestricted. They want to be able to access social networks, YouTube and personalize their systems by downloading favorite apps, backgrounds, etc.

Should you encrypt your mobile phone?

One of the more ubiquitous devices of the modern era is the smartphone. We can do nearly everything on it, and as such it has played a large part in the blurring of the lines between work and life. While this is good for many businesses, many of these devices are largely unsecured, which can lead to problems, especially if the unsecured data is actually sensitive company information.

Do you know how to spot spam?

Spam can be a number of things. The original being canned spiced ham developed by Hormel in the 1930s. Due to food rationing in Britain during the Second World War, Spam became a popular menu item, so much so that it seemed to be everywhere, in every dish, whether you liked it or not.

Unrestricted Internet access has risks

Open and unrestricted Internet access is one thing we consider to be a right, especially true for the younger generation who have grown up with it in their homes. Many have come to rely on the Internet both for work and day-to-day life. As such, they demand unrestricted Internet access at work, and many company bosses have obliged.

Going phishing? Windows 8 says no

Ahh phishing. We’re not talking about the get up early, sit on a boat in the hot sun all day kind, we mean the more harmful social engineering kind. While this isn’t new, it’s a big issue, one many users are well aware. They dread finding themselves victims of a malicious attack on their systems.