The Best Way to Be Safe
Wireless Network Security: What Users and Administrators Need to Know Computers of all kinds typically come with hardware built-in that allows them wireless connectivity to the internet and/or network access in which a host of resources are available. On the other side of the coin, there are wireless access points that are administered to allow computers the internet […]
Social Data Breaches: Tumblr Vulnerability Concerns Valid
Tumblr’s Data Breaches Risk: What You Need to Know Earlier this month, Tumblr disclosed a vulnerability that could have exposed protected user information under specific circumstances. This news came amid high-profile data breaches at Facebook and Google, raising concerns about online security. The Issue with Recommended Blogs A security researcher discovered a flaw in Tumblr’s […]
Why You Should Encrypt Email
Encrypt Email: Why It Matters and Its Key Benefits Encryption can be an invaluable tool for your company, especially where your email communications are concerned. Here, we’ll go over a few of the benefits you can see by adopting it – but first, we’ll briefly go over what encryption is. What is Encryption? Looking at […]
Facebook Database Breach: Practical Information
Facebook’s Database Breach On September 16, 2018, Facebook discovered unusual activity via their network analytics equipment — it appeared that computer hackers gained some type of access to a database of approximately 50 million users. In July of 2017, Facebook introduced a new feature called “view as“, which allowed owners of Facebook accounts to view their […]
File-less Ransomware Uses Windows Tools Against You
By now everyone knows about ransomware, the dastardly strand of malware that encrypts data (or the drives it’s stored on) and sends the user a message demanding payment in a certain amount of time before the data is deleted forever. To add a little more menace to an already stressful situation, the message includes a […]