Safeguarding your social media from hackers

Social media phishing is on the rise. Facebook is one of the most commonly impersonated brands in phishing attacks. Hackers now employ more sophisticated tactics, so you must strengthen your privacy settings to keep them away. Lock screens exist for a reason Lock all your computing devices as soon as you stop using them. This […]

Two excellent ways to verify user identity

To keep your network safe from cybercriminals, your first line of defense should be a secure login process. When it comes to verifying user identity, you can choose between two-step authentication and two-factor authentication. Know more about the difference between the two, so you can have a better appreciation of your cybersecurity options. If you […]

Check out iOS 12’s security & privacy features

iOS 12 brings a significant performance boost to both the previous and the latest iterations of Apple mobile devices, but that’s not all it has to offer. It also has an array of new and improved security and privacy features that you can tweak to better protect your iPhone or iPad and the data it […]

Leave no room for hackers to operate

For most people, social media is a convenient way to stay in touch with family and friends. For a small group of people, it’s an opportunity to profit off other people’s trust. Here are some things you can do to continue enjoying Facebook and Twitter without compromising your privacy. Lockscreens exist for a reason Make […]

Is two-step authentication the only way?

With all the recent hacking scares all over the world, you know and understand that your cyber security and your business’s cyber security are extremely important. However, when it comes to authentication processes, you may not be sure what the real deal is. There are two seemingly similar types of authentication that are often confused. […]

5 security measures made easy

Let’s face it, keeping yourself free from online threats can be a pain: using different passwords for every site, changing them every three months, using advanced encryption, the list goes on and on. You either end up paranoid of being online or give up altogether. We’ve organized 5 simple cybersecurity measures that we promise anyone […]

Secure remote access for employees who travel or work from home

Companies that have staff that travels or need to access the company network from home have the challenge of providing secure remote access for their staff. If the access provided for staff to the company network is not completely secure, then this becomes a possible target for hackers to gain access and install ransomware on the network or steal Intellectual Property.

Security Tip of the Week #5 – Turn on two-factor authentication for LinkedIn™

In the last couple of weeks, the news headlines were reporting that 117 million LinkedIn™ usernames and passwords were released. These were from 2012 when it was reported that 6 million account details were leaked. It turns out the breach was much larger than was reported 4 years ago, and while LinkedIn™ at the time reacted by requiring users that had been in the initial 6 million breach to change their passwords, it seems a lot more users should have been required to do the same.