A look back at the cybersecurity fiascoes of 2018

A look back at the cybersecurity fiascoes of 2018

The hottest business topic in 2018 was the General Data Protection Regulations (GDPR). GDPR is seen as the epitome of data protection legislation that safeguards businesses and organizations from data security breaches. Many companies have improved their technology infrastructures this year to guarantee their GDPR compliance.

The dangers of autocomplete passwords

The dangers of autocomplete passwords

Hackers have found a new way to track you online. Aside from using advertisements and suggestions, they can now use autocomplete passwords to track you down. Feeling unsecure? Here are some ways to keep you out of harm’s way. Why auto-fill passwords are so dangerous As of December 2018, there are 4.1 billion internet users […]

Benefits of using a VPN

Benefits of using a VPN

While using a virtual private network or VPN isn’t a silver bullet to online privacy threats, it still offers crucial security benefits, especially if any part of your day involves using unsecured channels such as public Wi-Fi. Given its importance, how do you pick the right one and what factors do you need to consider? […]

It’s time to rethink your password

It’s time to rethink your password

In 2003, a manager at the National Institute of Standards and Technology (NIST) authored a document on password best practices for businesses, federal agencies, and academic institutions. More recently, however, the institute has reversed its stance. Find out why and what great passwords are made of. The problem The issue isn’t necessarily that the NIST […]

What you must know about California’s new Internet of Things law

What you must know about California’s new Internet of Things law

Jerry Brown, the current governor of the Golden State, recently signed a law that prevents vendors from selling internet-connected products with preprogrammed passwords to consumers. Such passwords are easy to crack or guess, potentially leaving the user defenseless against malicious hackers

When the law takes effect in 2020, every Internet of Things (IoT) device created or sold in California (including cars, thermostats, baby monitors, and even refrigerators) has to come with a unique password or an internal feature that will request the user to set their own login credentials.

Do honest working hackers exist?

Do honest working hackers exist?

The word “hacker” conjures up an image of a hoodie-wearing basement dweller that programs all sorts of malicious attacks to infiltrate their target’s computer. But hackers are so much more than that. There are also hackers that use their skills to do good. A complicated history In the 1950s, the term ‘hacker’ was vaguely defined. […]

Why you should never cave to ransomware demands

Why you should never cave to ransomware demands

It’s a pretty scary thing to boot up your computer one morning only to find a ransom message claiming that you’ve been locked out of all your files until you pay a fee to a cybercriminal. That’s what ransomware does – it encrypts your data before trying to extort a ransom from victims who desperately need access to their files for work.

5 cloud security tips for business owners

5 cloud security tips for business owners

Cloud computing marketing can be deceiving. When you see an image of the cloud, it’s often a happy, bubbly, white puffball floating delightfully in front of a blue sky background. Its presence is both calming and reassuring, which makes you believe that anything is possible. Security would never be an issue, right? Ask one of […]

5 proactive defenses against cyberattacks

5 proactive defenses against cyberattacks

As IT security consultants, we’re stuck between a rock and a hard place. Managed IT services providers (MSPs) such as ours want to provide clients with enterprise-level IT, but that requires that we specialize in overwhelmingly intricate technology. Explaining even the most fundamental aspects of cybersecurity would most likely put you to sleep instead of […]