Simple ways to protect your email account

Everyone uses email as the central hub for their personal internet activities, but this also makes it an attractive target for cyberattacks. The importance of email security is vital to your company’s survival, so applying these simple tips can dramatically reduce your exposure to hackers and malware. Use separate email accounts Most people use a […]

5 Tips for protecting corporate data

A data breach can happen to anyone, even to the most secure businesses or financial institutions — and cybercriminals could even attack your company’s network. How can you be sure your network is completely hacker-safe? As a business owner, you can’t afford a data breach, as it could cost you your clients and reputation. Employing […]

What are 2-step and 2-factor authentication?

In the digital age, cybersecurity should be one of the top priorities for anyone who goes online. One way is to vet those who are trying to access your systems. But when it comes to verifying users’ identity, many are unaware of the two kinds of authentication measures available. Read on to know the differences […]

It’s time to rethink your password

In 2003, a manager at the National Institute of Standards and Technology (NIST) authored a document on password best practices for businesses, federal agencies, and academic institutions. More recently, however, the institute has reversed its stance. Find out why and what great passwords are made of. The problem The issue isn’t necessarily that the NIST […]

What’s the best way to verify user identity?

When it comes to protecting yourself and your business online, the type of authentication you use for logins, whether for business or for personal use, is vitally important. While many people understand that secure logins are crucial, the differences between the various security measures may be lost on many people. Before you give up on […]

Change your Dropbox password

In 2012, cloud storage firm Dropbox was hacked with over two-thirds of its users’ details dumped all over the internet. While the company initially thought a collection of email addresses was the only thing stolen, it was wrong — passwords had been compromised as well. This new information came to light when the database was […]

This small business was hacked. Are you next?

When it comes to the online security of their business, many SMB owners consider it an afterthought. They think their business is too small to be of any concern to cyber criminals, and there’s good reason for this mentality. How often are security breaches to SMBs listed in the news? Rarely. In fact, you may […]

7 Simple Ways To Keep Your iPad Secure

Don’t leave it lying around Although this is common sense, you’ve probably violated this rule more than once. iPads are easy targets for thieves, so don’t let it out of your sight when in a public place – and don’t leave it in plain view in your car or you might end up with a broken window in addition to a stolen iPad. Use a passcode Although it’s not 100% hacker-proof, it will block unauthorized users from accessing your information. Consider enabling automatic data erasing You can configure your iPad to erase your data after 10 failed passcode attempts. Clearly this is not a good solution for anyone who constantly forgets a password or those who have kids who might try to endlessly log in to use your iPad. Sign up for MobileMe As mentioned opposite, this software will allow you to locate a lost iPad and, if it’s not recoverable, you can remotely wipe the device of your private information. Limit its capabilities You can set your iPad to restrict certain functions such as access to Safari, YouTube, installing applications and explicit media content using a passcode. In the corporate world, an IT administrator could set these restrictions for company owned devices. At home, you can use this to restrict what your children can do with your iPad. Install software updates As with all software, make sure you have the latest security updates and patches installed to protect against hackers and viruses. Only connect to trusted WiFi networks Public WiFis are open territory for hackers and identity thieves. Whenever you connect, make sure it’s a legitimate, secure connection.