Encrypting Your Sensitive Documents
In the case of a security breach, you should already be sure that any confidential or sensitive information is protected in some way to prevent ...
In the case of a security breach, you should already be sure that any confidential or sensitive information is protected in some way to prevent ...
If your laptop is stolen, you can still protect your information. It’s another Tuesday in the airport, and you just cleared the security line and went to the pretzel shop for a quick bite before you catch your plane. You ...
You like to check e-mail and get a few things done after hours – but here’s something you might not know: you should never access company data, file servers or applications through personal devices and home PCs that are not ...
If it's installed, update it. Period. There are thousands of hackers who get up every morning with ONE goal in mind: to find a new vulnerability in a commonly installed software (like Adobe, Flash or QuickTime) to access your computer. ...
A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a ...
Not too long ago, the CryptoLocker ransomware virus was all over the news, infecting over 250,000 computers in its first 100 days of release (at least that’s the number reported – the real numbers are probably MUCH higher). The threat ...
You’re working at your computer when all of the sudden – BAM! – you get a pop-up notification that your PC is infected with a virus and you must “click here” to run a scan or install antivirus software. This ...
Thanks to powerful brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess a five-character password in under three hours. If you only use lower-case letters, it’s ...