Managed antivirus – what is it?

Business technology is becoming increasingly complex to manage. In fact, many business owners and even IT departments often don’t have the time to oversee every business function. One area where help is often needed is with regard to security, and more specifically antivirus based solutions. There are so many different options available that it can…

Is your data in the Cloud safe from prying eyes?

By now we’ve all heard the ruckus about the NSA’s scanning of email and electronic content. One thing that’s been largely overlooked by the overwhelming media response to this incident has been similar ongoing activity. For some time most of the major players in the Cloud have had embarrassing releases indicating that they have opened…

5 ways to insecure passwords

Chances are high that you already take great steps to ensure that your network and systems are secure from threats. But, do you take the same steps to ensure that your accounts like email, social media, bank, etc. are also secure? The weakest link of these accounts is the password, and that’s exactly where most…

5 common virus myths dispelled

Computers, while used in nearly every office, still mystify the vast majority of users. Sure they know how to operate one, but when it comes to ideas like the Internet and viruses, malware, trojans, etc. most people are lost. This is largely because of the large number of myths and lies about things like viruses,…

Site tracks changes to Terms of Service

One of the more popular debates about the Internet is who exactly owns your data and information when it goes online? Most of the information regarding this is held in the Terms of Service, which most people click and agree to without reading. The interesting thing about this is that web oriented companies usually update…

Take steps to secure online info

Think of the everyday usual precautions you take. When you get into a car, you put on your seatbelt; when you leave the house, you lock the door, the list goes on and on. Yet, when it comes to online security, most people are content with a virus scanner, and do little about securing their…

Hunt for your devices with Prey

Imagine you are in the airport waiting for a flight when you look down only to discover that your laptop is missing. This isn’t a great thought, especially since many of us have important files and programs that we can’t afford to lose. The problem is, if your device has gone missing, the chances of…

17 million UPnP devices at risk

As technology continues its creep into every aspect of our life, the number of Internet connected devices we use is also growing. This has led to an increase in the number and severity of security threats facing networks. It seems that almost every week a new security threat is uncovered. One of the latest can…