Twitter alerts users to cyber attacks

Twitter alerts users to cyber attacks

Something known as “state-sponsored cyber attacks” may not be something you have heard of until now. But with both Facebook and Google viewing the problem as serious enough to warn their users about, it seems this is an issue that could be here to stay.

How Google overcomes secure browsing issues

How Google overcomes secure browsing issues

It’s safe to say that malware attacks, phishing scams, and social media engineering practices are going nowhere fast. That means that, whether you are a home user or the owner or manager of a small or medium-sized business, if you choose to ignore safer online security practices you are putting your identity and the security of your company at serious risk.

Secure your SMB by following these rules

Secure your SMB by following these rules

Sufficient security policies can make or break your small or medium sized business. But the truth is that many SMB owners are unsure as to the type of security measures needed to protect their organization. That’s why we’ve compiled this list of the minimum security precautions that every SMB owner should follow to ensure their company is safe.

Vulnerability exposed by WhatsApp bug

News that a potential security threat in the web-based version of WhatsApp left up to 200 million of its users with their data exposed to hackers and malware acts as a reminder to us all to be vigilant in our online interactions. While the bug affected the popular instant messaging app’s web-based version rather than the mobile app itself, and was remedied by WhatsApp after being detected by an Israeli IT firm, it’s nonetheless a worry for those of us who rely on WhatsApp for both business and pleasure.

Takeaways from the Ashley Madison hack

Regardless of what you think about the Ashley Madison hack, it is big news when it comes to data security. While your company may not be as big or deal with such a sensitive topic like Ashley Madison, you can still be at risk. This scandal can serve as a springboard to improving security throughout your company.

The different types of malware: explained

Ever been infected by malware or a virus? For most internet users, the answer is probably yes. But what is the difference between all the cyber threats out there? What makes a virus different from a trojan or worm? And how can you protect your critical data and your business from these threats? If you’ve never been able to answer these questions, here’s the explanation you’ve been waiting for.

MasterCard’s new selfie verification

Love them or hate them, selfies are here to stay. And with facial recognition technology becoming both more advanced and more mainstream, selfies have now found their way into the online security world. MasterCard is the most recent global corporation to join in on the trend.

Google boosts security with physical keys

If your business is lacking adequate security protection, the doors are wide open to an attack from outside. To make things worse, security threats are constantly evolving and developing, rendering them more difficult to keep up with. At least Google is on your side – its recent introduction of physical Security Keys for Drive for Work users means an extra layer of safeguarding for the cloud-based data files you rely on to power your organization.

How to transition to the cloud securely

Cloud computing marketing can be deceiving. When you see an image of the cloud, it’s often a happy, bubbly white puffball floating delightfully in front of a blue sky background. Its presence is both calming and reassuring, and makes you believe that anything is possible.

Protect business data with these tips

Business data is something you can’t afford to lose, since it could lead to you losing the trust of your clients, resulting in loss of revenue. And since the hackers aren’t going anywhere, it’s more important than ever to employ security measures to protect your business data.