
Train your staff: Your first and best firewall
Protecting your organization against cyber threats can seem like a challenge that involves extremely high-tech wizardry, sophisticated...


Strengthening your cybersecurity policies
Formulating strong IT policies and laying down the best practices for your staff to follow is one of the best ways to prevent your...


Why and How to Use a Passphrase
When you create a password, what does it look like? Is it the same password for everything, or are they all different? Are you the person...


Webroot: SecureAnywhere Antivirus Software
Webroot is an American Security Software as a Service company headquartered and founded in Colorado. Having multiple US and...

Chromecasts Are Being Hijacked
Thousands of Google Chromecast products have been taken over by a couple of identified hackers who have exploited a supposed weakness in...


Hacking the Holidays: Online Shopping
The Holiday season always brings two things: cooler weather, and a relentless increase in online shopping. Clearly being a much easier...

Office365 Multi-Factor Authentication Issues.
As widely used as Microsoft services are, they aren’t immune to technical problems, especially regarding some of the functions of...

Wi-Fi Security Is Getting a Major Upgrade.
Wi-Fi devices have been using the same security protocol for over a decade. But today, that’ll begin to change: the Wi-Fi Alliance, which...

Intel Plans to Improve CPU Security
Intel recently announced it will take a keener stance on security designs within forthcoming CPUs. There are two new features designed...

Google Removes Fake Browser Extensions
Google is further stepping up their security improvements and recently removed 5 top ranking ad blockers that turned out to be fake. The...