IT Security Tip #13 - Don't Use Public WiFi Until You Hear This
This video is about the precautions you should take when connecting to public WiFi.
This video is about the precautions you should take when connecting to public WiFi.
If you’re using Dropbox, Google Drive or other consumer-grade file sync and sharing cloud applications, listen up! These applications pose a huge threat to your company because company data can be spread far and wide without central oversight of what ...
So you’re in the car on the way home from Starbucks, basking in the glow of consuming your triple-shot, low-foam, extra-hot pumpkin-spice latte when you suddenly realize your laptop has gone missing. You drive back like the caffeinated lunatic you ...
Like it or not, PC manufacturers LOVE to stuff your brand-new PC full of “free” applications (they get paid to do it, so you’ve got a slim chance of getting one without a side of spamware). But clutter is the ...
There are thousands of hackers who get up every morning with ONE goal in mind: to find a new vulnerability in a commonly installed software (like Adobe, Flash or QuickTime) to access your computer. That’s why these companies frequently issue ...
Cloud computing is a concept that could possibly save your business quite a bit of money on software, hardware, upgrades and services. Instead of purchasing hardware and software for your office, you can use “the cloud” to put your programs ...
Here’s a sneaky trick used by many hackers: they purchase and set up a fraudulent web site that is a close misspelling of a legitimate one. Example: www.faceboook.com instead of www.facebokk.com. All you have to do is accidentally fat-finger ONE ...
You’re a hardworking team player who likes to check e-mail and get a few things done after hours – all good! But here’s something you might not know: you should never access company data, file servers or applications through personal ...
A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a ...
Not too long ago, the CryptoLocker ransomware virus was all over the news, infecting over 250,000 computers in its first 100 days of release (at least that’s the number reported – the real numbers are probably MUCH higher). The threat ...