Takeaways from the Ashley Madison hack

Takeaways from the Ashley Madison hack

Regardless of what you think about the Ashley Madison hack, it is big news when it comes to data security. While your company may not be as big or deal with such a sensitive topic like Ashley Madison, you can still be at risk. This scandal can serve as a springboard to improving security throughout your company.

The different types of malware: explained

The different types of malware: explained

Ever been infected by malware or a virus? For most internet users, the answer is probably yes. But what is the difference between all the cyber threats out there? What makes a virus different from a trojan or worm? And how can you protect your critical data and your business from these threats? If you’ve never been able to answer these questions, here’s the explanation you’ve been waiting for.

MasterCard’s new selfie verification

MasterCard’s new selfie verification

Love them or hate them, selfies are here to stay. And with facial recognition technology becoming both more advanced and more mainstream, selfies have now found their way into the online security world. MasterCard is the most recent global corporation to join in on the trend.

Google boosts security with physical keys

Google boosts security with physical keys

If your business is lacking adequate security protection, the doors are wide open to an attack from outside. To make things worse, security threats are constantly evolving and developing, rendering them more difficult to keep up with. At least Google is on your side – its recent introduction of physical Security Keys for Drive for Work users means an extra layer of safeguarding for the cloud-based data files you rely on to power your organization.

How to transition to the cloud securely

How to transition to the cloud securely

Cloud computing marketing can be deceiving. When you see an image of the cloud, it’s often a happy, bubbly white puffball floating delightfully in front of a blue sky background. Its presence is both calming and reassuring, and makes you believe that anything is possible.

Protect business data with these tips

Protect business data with these tips

Business data is something you can’t afford to lose, since it could lead to you losing the trust of your clients, resulting in loss of revenue. And since the hackers aren’t going anywhere, it’s more important than ever to employ security measures to protect your business data.

Oust the pesky virus from your Android device

There are things that all of us hold dear to our hearts: family, a stable career, and our smartphone and tablet. Okay, maybe those last two aren’t as important as the others. But still, your smartphone or tablet is likely an integral part of your life.

How to protect your email account

If you think your email is fully protected from hackers, think again. A lack of sufficient email security measures can result in data theft, unauthorized access to sensitive information and the invasion of your computer by viruses and malware. Here are some tips to secure your email account from unwanted intruders and the many troubles that come with them.

Venmo adds multi-factor authentication

It’s easy to get complacent about internet security, but the reality is that none of us can afford to let our guard down. Precautions to protect yourself, your identity and your finances online can be simple, but they are only effective when practiced rigorously and consistently.

Improved internet security with 3 easy tips

Are you concerned about internet security? Did you know there are a few simple ways to get increased protection that require only minimal investment of time? We’re not just talking about changing your passwords regularly or installing antivirus software.