Think your password is secure? Think again

Think your password is secure? Think again

A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case, according to the National Institute of Standards and Technology (NIST). The NIST created many of the password best practices you probably loathe — the combination of letters, numbers, and special characters — but it now says those guidelines […]

Not all hackers are cybercriminals

Not all hackers are cybercriminals

Newspaper headlines and Hollywood movies have shaped our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making massive contributions to the field of cybersecurity, it just depends on which hat they’re wearing that day. Take a few minutes to learn about white, black, and gray hat hackers. […]

Want Repeat Business? Protect the Customer’s Data

Want Repeat Business? Protect the Customer’s Data

Ask most CEOs how they get new customers, and “referrals” will be in the top three. How do you get referrals? Earn the trust of your customers, and they will tell their friends about you. On the other hand, if you lose that trust, customers will not only leave, but they’ll also tell their friends why.

7 Ways to Shop Safer Online

7 Ways to Shop Safer Online

Each year, Black Friday and Cyber Monday are expected to be a shopper’s paradise with the biggest discounts available from almost every retail store, in-store and online. With more than 4 billion internet users currently worldwide, it is also a hacker’s dream to target the expected two biggest online shopping days.

How to Know When Your Data Enters the Dark Web

How to Know When Your Data Enters the Dark Web

The breach of as many as 90 million Facebook accounts is bad news for the social media company, but it’s even worse news for the users whose sensitive personal data was compromised. That’s because hackers won’t make their money by posting an embarrassing status update or “liking” Nickelback on your profile.

The lowdown on cloud security

The lowdown on cloud security

If you’re thinking of transitioning your business to the cloud, consider the security of the platform. While providers would like us to believe that the friendly, fluffy cloud image used to market the service means it is automatically secure, the reality is far different. Just ask one of the nearly seven million Dropbox users who […]

Is your IT security proactive?

Is your IT security proactive?

Do you spend hours obsessing about the inner workings of DNS-layer security, intrusion prevention systems, and data encryption? If you’re not a managed IT services provider (MSP), you probably don’t. Instead, you’re probably looking for a business partner to manage those nitty-gritty details for you. However, there’s one thing you really ought to know: What […]

Secure your Mac computer in 6 easy ways

Secure your Mac computer in 6 easy ways

If you’re a Mac user, data privacy and security should be your #1 priority. Without the right security measures, you’re inviting cybercriminals to steal your critical data. Are you willing to take the risk? Secure your computer and fortify your defenses with these six tips.  The basics First, let’s start with the basics and head […]

Featured on Due – 4 Strategies to Avoid Costly Credential Stuffing

Featured on Due – 4 Strategies to Avoid Costly Credential Stuffing

Cybersecurity threats are becoming more prevalent each year, and business owners need to focus on protecting their companies and upgrading their defenses. Companies that use the internet to do business are especially at risk for credential stuffing, a tactic wherein botnets attempt to use fraudulent login data to access information.

4 types of hackers that may target SMBs

4 types of hackers that may target SMBs

When it comes to cyberattacks, most business owners get hung up on the technical and logistical details, forgetting another important aspect: motive. Why are hackers attacking people and organizations? And whom are they targeting? By answering these questions, you’ll have a better understanding of which of your business’s resources need the most protection. Script Kiddies […]