In the digital age, cybersecurity should be one of the top priorities for anyone who goes online. One way is to vet those who are trying to access your systems. But when it comes to verifying users’ identity, many are unaware of the two kinds of authentication measures available. Read on to know the differences […]
In 2003, a manager at the National Institute of Standards and Technology (NIST) authored a document on password best practices for businesses, federal agencies, and academic institutions. More recently, however, the institute has reversed its stance. Find out why and what great passwords are made of. The problem The issue isn’t necessarily that the NIST […]
When it comes to protecting yourself and your business online, the type of authentication you use for logins, whether for business or for personal use, is vitally important. While many people understand that secure logins are crucial, the differences between the various security measures may be lost on many people. Before you give up on […]
In 2012, cloud storage firm Dropbox was hacked with over two-thirds of its users’ details dumped all over the internet. While the company initially thought a collection of email addresses was the only thing stolen, it was wrong — passwords had been compromised as well. This new information came to light when the database was […]
When it comes to the online security of their business, many SMB owners consider it an afterthought. They think their business is too small to be of any concern to cyber criminals, and there’s good reason for this mentality. How often are security breaches to SMBs listed in the news? Rarely. In fact, you may […]
Don’t leave it lying around Although this is common sense, you’ve probably violated this rule more than once. iPads are easy targets for thieves, so don’t let it out of your sight when in a public place – and don’t leave it in plain view in your car or you might end up with a broken window in addition to a stolen iPad. Use a passcode Although it’s not 100% hacker-proof, it will block unauthorized users from accessing your information. Consider enabling automatic data erasing You can configure your iPad to erase your data after 10 failed passcode attempts. Clearly this is not a good solution for anyone who constantly forgets a password or those who have kids who might try to endlessly log in to use your iPad. Sign up for MobileMe As mentioned opposite, this software will allow you to locate a lost iPad and, if it’s not recoverable, you can remotely wipe the device of your private information. Limit its capabilities You can set your iPad to restrict certain functions such as access to Safari, YouTube, installing applications and explicit media content using a passcode. In the corporate world, an IT administrator could set these restrictions for company owned devices. At home, you can use this to restrict what your children can do with your iPad. Install software updates As with all software, make sure you have the latest security updates and patches installed to protect against hackers and viruses. Only connect to trusted WiFi networks Public WiFis are open territory for hackers and identity thieves. Whenever you connect, make sure it’s a legitimate, secure connection.
Have you ever clicked “Never Remember” for a password, only to decide later that you do want Firefox to remember it? Here’s how you can get Firefox to re-prompt you. Read more .