Windows 10 Vulnerability Allows Hijack, Even When Locked!

Is your computer and Network Security up to scratch? Regardless of whether the device has been locked, a recent vulnerability in Windows 10 has given hijackers an easy route to taking over – simply by using the digital assistant, Cortana, to execute commands. If you’re running Windows 10, you may want your IT Support personnel to tighten up the… Continue reading Windows 10 Vulnerability Allows Hijack, Even When Locked!

 

Are Employees Undermining Your Security With Weak And Shared Passwords?

This article talks about the security risks associated with weak passwords in your business. Studies show there is a significant percentage of employees who will use weak passwords so it’s important to talk about the impact that has on your ability to defend against cyber attacks… Though most employees are not trying to compromise security,… Continue reading Are Employees Undermining Your Security With Weak And Shared Passwords?

 

Why Hackers Love Companies That Don’t Use Multifactor Authentication

The recent breach of the popular mobile app Timehop was caused by hackers breaching the app. It then exposed the credentials, phone numbers and social media histories of more than 21 million users. There was also a considerable length of time that the hacker’s presence went undetected. This article about hackers, authored by David Vergara,… Continue reading Why Hackers Love Companies That Don’t Use Multifactor Authentication

 

What Is a Firewall?

In computing and networks, a firewall is software, hardware or firmware (which is permanent software programmed into a read-only memory.) that follows a specific set of rules to decide whether to allow information or data to enter or leave a network. Firewalls have been a crucial defence in network security for over 25 years. They… Continue reading What Is a Firewall?

 

Why You Should Be Using A VPN

Even with GDPR tightening the reins on personal data collecting and processing, you still have to ask yourself how much of your personal life is transmitted over the internet almost passively. If you want to take your online privacy to the next level, you should consider using a virtual private network (VPN), which gives you… Continue reading Why You Should Be Using A VPN

 

Are You Using Encryption?

If you’re not utilising any encryption procedures in your overall network security, can your internet connection be tapped like a telephone line? In a nutshell (although it’s never that simple); Yes! If you’re using a wireless network to connect to the internet and browse or perform any other daily tasks, other devices in the vicinity that… Continue reading Are You Using Encryption?