Password Managers: What They Are, and How They Can Protect Your Life Online

By now, we’re all used to using passwords to authenticate our identities online. But as we’ve grown more accustomed to coming up with and remembering passwords, cybercriminals have gotten far better at stealing them. The result is that many of our online accounts are at high risk for breach, especially because most people have bad habits when it comes to passwords. A study in 2015 found that nearly 3 out of 4 people use the same password for multiple accounts, and that 68% of people were using passwords that were five years old or older. Unsurprisingly, this same study found that 2 in 5 people surveyed had experienced some sort of security incident online.

The problem, of course, is that good password habits are difficult to learn and even harder to carry out. Thankfully, tools now exist that can drastically improve your password security. They’re called password managers.

Read More

5 Reasons to Consider Data Center Colocation for Company Assets

When businesses are deciding where to host their vital resources—email, key applications, and company data—the conversation usually revolves around two options: company-owned servers at the office or servers owned and maintained by a cloud vendor (commonly referred to as “the cloud”). But a third option, though not discussed as often, might be a better fit for some businesses. And that’s data center colocation.

Read More

Yik Yak: A Social Media App That’s Unsafe for Kids and Teens

Yik Yak: A Social Media App That’s Unsafe for Kids and Teens

A couple months back, we reviewed a social media app called After School. Because the app allows teens to post anonymously, we raised the caution flag. We acknowledged, however, that After School’s developer does seem to have implemented some important safeguards to minimize inappropriate or dangerous content. Yik Yak is a different story.

Like After School, Yik Yak is asocial media app that allows it’s users to post anonymously. Unlike After school, the app contains relatively few safety features to protect younger users.

Read More

How To Use Two Factor Authentication To Protect Your Data And Peace Of Mind

As we continue to move more aspects of our daily lives online, cybercriminals are developing more sophisticated ways of hacking our accounts and stealing our passwords. From banking to grocery shopping to managing household appliances, we’re putting ourselves at risk every time we create a new account. It’s gotten to the point that usernames and passwords just aren’t enough to protect our privacy. 

Read More

Scam Alert: "Malware Warning" Pop-Ups

We’ve written in the past about phone scams where a criminal poses as a representative from “Microsoft Support,” asking for credit card payment to perform some necessary maintenance on someone’s computer. Thankfully, increased education on cybersecurity has raised consumer awareness of scams like these, but criminals have gotten even smarter at figuring out ways to steal your information.

Over the last six months, and increasingly in the last few weeks, though, we’ve seen multiple instances, as well as reports from others, of a new variation on this scam, which is even trickier.

Read More

3 Tips for Protecting Your Smart Home Devices from Hackers

Think you may be getting tech gifts this Christmas? Smart home devices—from light bulbs to thermostats to coffee pots—make great gift items. These devices, referred to collectively as the Internet of Things (IoT), are on the frontier of tech innovation, changing the way we interact with everyday household items in some helpful ways.

But with these innovative new devices come security risks.

Read More

Don’t Get Hacked. Encrypt Your Email.

f you’ve been paying attention to the news in recent weeks, you’ve been hearing about high-profile email hacks. Individuals or state actors have stolen and begun releasing the contents of a certain presidential campaign’s emails to the press.

Now, setting aside any political elements to these recent stories, the technical side of them should be downright terrifying to businesses and individuals who send sensitive information over email. While the Clinton campaigns email hacks were actually the result of a phishing email, the bigger picture behind the news stories is that email is an incredibly insecure means of communication.

Read More

9 Must-Read Posts for National Cyber Security Awareness Month

9 Must-Read Posts for National Cyber Security Awareness Month

October is National Cyber Security Awareness Month! This is a great opportunity to raise awareness about a topic that is more pertinent than ever, as recent headlines show, and affects all businesses and organizations. To help in that effort, below is a curated list of helpful articles from our resource archives. All nine of these articles give businesses and organizations practical advice on how to keep their data safe. Read through them, and share this post with your friends and colleagues!

Read More

Would You Click The Links In This Email?

One of the best lines of defense against the threat of fraudulent emails impacting your organization is to raise awareness, which has become a key component of a holistic cybersecurity strategy. To help you get started, here's a test. Take a look at the email below, which was sent from the email address office@365.com. The "User ID," which is blacked out, was the recipient's email address.

Would you click the links in this email?

Read More

Children on the Internet: The Dangers and What to Do About Them

We all have a vague sense that there’s a “bad” side of the internet—a side we don’t want children to experience. We’ve heard stories of horrible cases of cyberbullying—where, at the very least, children’s self-esteem is ruined. We hear stories of “sexting” among younger and younger teens. And we know pornography is all too easy to find. But while we’re aware of the dangers, it’s tempting to think that none of this applies to your child.

Read More