CryptoWall: a new security threat

CryptoWall: a new security threat

Is your business secure from the latest malware and security threats? The truth of the matter is that there is always a chance that your business and systems can be attacked and breached by a variety of security threats. One of the more common threats of last year was a nasty piece of ransomware called Cryptolocker.

Shellshock 101: What is it?

Shellshock 101: What is it?

Earlier this year news broke of one of the most widespread and potentially devastating bugs to-date – Heartbleed. While heartbleed was massive and companies are still dealing with the fallout to this day, news has recently broke of an even bigger potential threat: Shellshock.

Business security: 5 Common flaws

Business security: 5 Common flaws

With the ever growing number of security threats faced by businesses around the world, the vast majority of business owners have adopted some form of security measures in an effort to keep their organizations secure. But, how do you know the measures you’ve implemented are actually keeping your systems safe? Here are five ways you can tell if your security measures aren’t sufficient.

Avoid cloud and data breach

Avoid cloud and data breach

Data breaches are growing both in number and intensity. While many businesses have turned to cloud apps for better security measures, some experts and businesses worry about the cloud, mentioning that it could see an increased data breach risk. This leads to a collision course between data breaches and cloud usage.

Juice jacking 101

Juice jacking 101

With smartphones playing a larger role in today’s daily business, the need to recharge them while you are on the go increases. And when you’re nowhere near your charger, that public charging kiosk can look pretty promising. But what you might not know is that common traits in smartphone hardware and software design makes recharging phones through public chargers prone to juice jacking.

IE security flaw exposed

IE security flaw exposed

As we increasingly come to rely on cloud-based systems, the browser will likely become even more important to business owners and managers. While there are a number of browsers out there, many Windows users prefer to use Internet Explorer (IE), largely because it is the browser which comes pre-installed on all Windows computers.

How to make secure passwords

How to make secure passwords

Passwords are made to safeguard our online accounts. But in this day and age when rampant hacking incidents happen every day and around the world, security is oftentimes compromised. As a result, private data can fall into the wrong hands. For this reason, it is imperative that the passwords protecting your data are strong enough to throw off hackers.