Security Tips

BYOD Rules, Network Security & Your Business

The integration of sophisticated interfaces in modern devices has made it difficult to draw a line between personal and business usage. Nearly a decade back, it was fairly easy to differentiate between data/software/applications targeted or being used at an enterprise level and those at a personal scale. The data that is being circulated around can be classified as business and non-business. Each has its own specific attributes with respect to sharing and security management.

Continue Reading

The Top 3 Most Dangerous Computer Viruses

Computer viruses have come a long way since the very first one in early 1970s. Back in those days, computer viruses were basically self-replicating programs which didn’t do a lot of harmful activities (or anything harmful at all). Most were intended as academic testing purposes, and some were pretty much intended as jokes. The first virus in the wild was Elk Cloner, which essentially cloned itself from floppy disks to spread and upon 50th use, it will show a poem.

Continue Reading

Is Your Computer Ready for Cyber Attacks?

Small businesses and private individuals should step up their computer security today. Statistics reveal that cyber criminals are attacking those two factions more intently now. Fortunately, reinforcing your line of security is not as hard as you think. Small businesses and private individuals are both prone to thinking that they are the last in any cyber criminals’ hit list. With so many large corporations around the world, there’s little chance that any smart criminal will waste his time on you.

Continue Reading

Java – A Huge Security Problem in Your Computer

Many of the attacks on a computer system involves exploiting weaknesses in installed software. Everything from the operating system, Web browsers, office software, and software that just connects to the Internet, may have weaknesses that hackers can exploit to install malicious software. Most of the time malicious software that targets a particular application exploit is limited to a particular type of computer, such as Windows or Apple.

Continue Reading

How LastPass Keeps Your Passwords Safe and Secure

The reason I trust my passwords in LastPass is because of the security of the system. LastPass is about as secure as you can get for keeping your passwords safe. The reason is how the lengths they goto to ensure your personal information remains as secure as possible. In order to see whay I trust LastPass, it is important to understand how your passwords are secured within the service. Let me try to explain the security process of LastPass as best as I can. For those that have used LastPass you know that you are required to login using two pieces of information: your email address and your master password.

Continue Reading

3 Applications You Must Keep Updated at All Times

It seems that each week we are constantly interrupted by popup windows on our computers instructing us to update an application. If you are like me, these popup windows can be quite annoying. As annoying as I might find them, they appear for a good reason – to ensure that the software we have on our computer is the latest, and hopefully, the most secure version available.

Continue Reading

Beware Of The Scam!

Beware scammers from all directions! Criminal elements will try and trick you into handing over your money by telephone, email, post and via the web. Remember the following tips to avoid being caught out.

Continue Reading