1502, 2019

Lock down iOS 12 devices with these features

By |February 15, 2019|Categories: Apple|Tags: , , , , , , , , , , |

iOS 12, Apple’s latest mobile software offering, is finally available, and it promises to be better at keeping your data locked down. Here are some tweaks that you can make to boost iOS 12’s security and privacy settings. Set a stronger passcode iOS 12 now requires six-digit passcodes, and this [...]

3101, 2019

Are autocomplete passwords safe?

By |January 31, 2019|Categories: Security|Tags: , , , , , , , , , , |

Advertisements and suggestions based on our internet browsing habits are sources of online tracking. However, autocomplete passwords are also another source of online tracking. This sneaky tactic comes with serious security risks. Here’s how you can stop it from targeting you. Why auto-fill passwords are so dangerous As of December [...]

1701, 2019

Single Sign-On: The key to user management

By |January 17, 2019|Categories: Web & Cloud|Tags: , , , , , , , , |

Making passwords can be tedious. From complexity requirements to minimum lengths, creating a password for each new account brings its own set of headaches. If this problem is reaching a boiling point, Single Sign-On (SSO) solutions can help. These techniques are secure, easy-to-manage, and do away with the need to [...]

2307, 2018

IT policies to protect your business

By |July 23, 2018|Categories: Security|Tags: , , , , , , , |

Employees are one of your biggest security holes. There is no foolproof prevention method for human error, which is why employee mistakes are one of the most common causes of a security breach. To reduce potential risks, we’ve suggested a few IT policies you should implement to protect your business. [...]

2006, 2018

Router malware worse than experts realize

By |June 20, 2018|Categories: Security|Tags: , , , , , , , , |

In May, security experts discovered one of the most widespread malware infections in history. Now, they’re warning businesses and consumers that it’s even worse than their first assessment. The VPNFilter malware poses a threat to small businesses and requires immediate attention from anyone who hasn’t taken action against it. VPNFilter [...]

2002, 2018

What Is Single Sign-On and Who Is It For?

By |February 20, 2018|Categories: Web & Cloud|Tags: , , , , , , , , |

Statistics show that the average enterprise uses more than 90 cloud services. Even if small businesses use less than half that number, securely managing account logins is still a huge problem for users and administrators. Single Sign-On (SSO) is an excellent solution to this issue, so let’s dive into how [...]

901, 2018

Think before saving logins to your browser

By |January 9, 2018|Categories: Security|Tags: , , , , , , , , |

There are a number of reasons you should be wary of saving your password to a digital platform. Just look at Yahoo’s data breach in 2013, which leaked passwords for three billion people. Even when your password isn’t compromised, saving it to a browser could have serious implications for your [...]

1506, 2016

Learn from this NFL team’s EMR fumble

By |June 15, 2016|Categories: Healthcare|Tags: , , , , , , , |

ESPN recently reported that a laptop containing the medical records of thousands of NFL players was stolen from the car of a Washington Redskins’ trainer. And while the team released a statement saying no health information protected under HIPAA guidelines was at risk, the incident shows that EMRs are vulnerable [...]

902, 2016

IT Security Policies you need to implement

By |February 9, 2016|Categories: Security|Tags: , , , , , , , |

Most business owners have an employee handbook. But when it comes to the online security of their business, often times this portion is either not adequately addressed, or not addressed at all. However, with cyber crimes an ever increasing threat, and the fact that employee error is one of the [...]

Go to Top