Cybercriminals can crack weak passwords in seconds and easily gain access to online accounts, especially when used in conjunction with an email address-based username. Learn how to create stronger passwords so that your business accounts are not hacked.
The main delivery method for ransomware is through phishing and spear phishing emails. Learn how taking a simple action can help protect against ransomware attacks.
With IT security training, your employees can provide an important line of defense against cybercrime. Here are six tips to help make that training more effective.
Using network printers makes good business sense, but they can leave your business vulnerable to cyberattacks. Learn about the security risks and what you can do to mitigate them.
Tech support scams have been around for years, but their perpetrators have added a new twist. In addition to calling, they are now sending phishing emails. Find out how the phishing-based scam works and how to protect your business against this threat.
Your phone rings. As soon as you say “Hello”, the caller identifies himself as a tech support staff member from a well-known tech company. He tells you that he has detected a serious problem on your computer, which you need to fix immediately.
The data breach disclosed by Equifax in September 2017 was massive. Discover what data was stolen, how many people were affected, and how you can protect yourself.
A security vulnerability in the WPA2 encryption protocol leaves most wireless devices susceptible to a Key Reinstallation Attack, or KRACK. However, the problem is not as horrific as it might seem. Learn why you do not need to panic and what you can do to protect your business’s wireless devices.
Electronically sharing Word documents lets you quickly give people the information they need while saving printing costs. However, these documents might contain more information than you realize. Find out the types of data that might be hidden in your Word files and how to remove that data.
Setting up a remote-access VPN can be beneficial for companies with employees who often work offsite or use their own personal devices for work. Here is what you need to know about this type of VPN.
In iPhone X, Apple has replaced Touch ID with a new authentication method called Face ID. Here are eight things you need to know about Face ID before you decide whether to use it on business phones.