Think before saving logins to your browser

There are a number of reasons you should be wary of saving your password to a digital platform. Just look at Yahoo’s data breach in 2013, which leaked passwords for three billion people. Even when your password isn’t compromised, saving it to a browser could have serious implications for your privacy. Why auto-fill passwords are […]

Big gains for small-business IT in 2017

How many new technologies did your business adopt last year? Too many? Too few? You’ve officially made it through 2017 and there’s no better time than now to review which IT fads were worth investing in, and which ones should be left in the past. Look no further than our recap of last year’s most […]

Cybersecurity Essentials: VPN

Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN). What is VPN? Simply put, a VPN is a group […]

Who are the ShadowBrokers?

The WannaCry ransomware strain was created by amateurs who copied and pasted security vulnerabilities from a famous hacker group. It’s no longer a threat if you have updated your computer, but as evidenced by a recent announcement, the hacker group will continue to release dangerous security exploits for anyone to use. Who are the ShadowBrokers? […]

What you can learn from Equifax’s leak

When it comes to security, it’s better to be safe than sorry. But as the Equifax leak case has taught us, once a security breach does happen, it’s best not to be sorry twice. Read on so your business doesn’t experience the same fate as the giant, bumbling credit bureau. What happened to Equifax? Equifax, […]

Ransomware is coming to your Android

Traditional ransomware like WannaCry has been explained a thousand ways on a thousand blogs. But one thing you may not have thought about is what ransomware would be like if it infected your mobile device. Read on to learn more. How does ransomware make it onto your Android device? Like its desktop equivalent, mobile ransomware […]

Black and white: Not all hackers are bad

When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he was in handcuffs for allegedly creating a piece of malware that steals banking information. Even if he is innocent, it’s important to understand the difference between white hat, black hat […]

Tips for keeping your mobile devices safe

Businesses are using mobile devices more than ever to increase productivity and profitability. However, like desktops and laptops, smartphones and tablets are highly vulnerable to hacking, and some employees expose them to threats in ways they may not even be aware of. To protect your company from these threats, follow these tips on keeping mobile […]

Why is Windows XP getting updates?

Microsoft products usually have an end-of-support date, where no more feature updates and security patches will be offered. However, earlier this month, Microsoft has released a security update for Windows XP, an operating system that has been unsupported since 2014. Although releasing a patch for an old system seems unusual, Microsoft does have its reasons. […]