Web

A category showcasing all the types and advantages of web and internet security.

Ransomware attacks – how to protect your business

The number of ransomware attacks is increasing at an alarming rate, making ransomware the biggest cyber threat that businesses are facing today. To see this disturbing trend, you only have to turn back the clock to the beginning of 2016. There was a 30 percent increase in the number of ransomware attacks in the first …

Ransomware attacks – how to protect your business Read More »

5 Ways Password Managers Can Help You Become More Organised and Efficient

Password managers are great for generating and storing strong passwords for online accounts. Many password managers, though, have additional features that let you easily store and access other types of information. Here are five ways you can take advantage of those features so that you can be more organised and efficient: 1. Auto-Fill Fields on …

5 Ways Password Managers Can Help You Become More Organised and Efficient Read More »

Ransomware warning

Computer users are advised not to click on links or open attachments in uninvited or unexpected emails and be wary about the websites they visit as security researchers identify hazardous new versions of ransomware. They should keep regular backups of important files and store the backups in a location away from a network. Ransomware is …

Ransomware warning Read More »

Insider Threats: How to Counter Internal Cybersecurity Risks

If you ask people about cybersecurity, they will probably start talking about hackers breaking into a company’s computers from hundreds of miles away. However, a threat just as destructive could be hiding inside that company’s offices. This is commonly referred to as insider threats. These insider threats typically fall into two groups. The first group …

Insider Threats: How to Counter Internal Cybersecurity Risks Read More »

Wearables

The Advantages and Challenges of Using Wearables in the Workplace

In the past, wearable computing devices, commonly known as wearables, were primarily used for health purposes. Runners, for example, would use them to track their vital signs as well as the distances they ran. Products like Android Wear and Apple Watch, however, have pushed wearables out of the health niche and into popular culture. These …

The Advantages and Challenges of Using Wearables in the Workplace Read More »

Internet explorer

Security Warning For Older Versions of Internet Explorer

If you are using an older version of Microsoft Internet Explorer, there is an important deadline that has just passed: January 13, 2016. From this date, only the most recent version of Internet Explorer available for a supported operating system will receive security updates and technical support. In other words, you will receive security patches …

Security Warning For Older Versions of Internet Explorer Read More »

Cloud Service Providers

How Cloud Service Providers Can Prove Their Data Security Claims

Cloud service providers (CSPs) often claim that their customers’ personal data is secure in their clouds. You can now check to see whether that is the case, thanks to a global standard published in 2014. People often refer to the standard as ISO 27018 but its official title is “ISO/IEC 27018:2014 — Information technology — Security …

How Cloud Service Providers Can Prove Their Data Security Claims Read More »

Online

How to Stay Safe Online in 2016

Now that 2016 is well underway, you should review how well you protect your family and business computers, mobile devices and information in the new year. Being safe online is becoming more critical with more devices connecting online every day. Criminals are likely to redouble their efforts to make money by gaining unauthorised access to …

How to Stay Safe Online in 2016 Read More »

Password protection

Password protection, is your password secure enough?

Password protection is essential to avoid hackers into your private and personal data. On Tuesday, the password-management company SplashData released its annual list of the most popular passwords of the past year. SplashData took a look at the more than 2 million passwords that got leaked last year, analyzing the most commonly leaked passwords and those …

Password protection, is your password secure enough? Read More »

How to Protect iPhones and iPads from Cyberattacks

How to Protect iPhones and iPads from Cyberattacks

Apple has built a solid reputation for producing secure mobile devices. Some of the tech giant’s customers believe that Apple products are so secure that they do not need to take any additional security measures. However, Apple’s mobile devices are not without their flaws. There are known vulnerabilities in the iOS operating system and in …

How to Protect iPhones and iPads from Cyberattacks Read More »

Scroll to Top