2510, 2018

Secure your Mac computer in 6 easy ways

By |October 25, 2018|Categories: Apple, Security|Tags: , , , , , , , , , , |

If you’re a Mac user, data privacy and security should be your #1 priority. Without the right security measures, you’re inviting cybercriminals to steal your critical data. Are you willing to take the risk? Secure your computer and fortify your defenses with these six tips.  The basics First, let’s start [...]

1605, 2018

How much does Apple know about you?

By |May 16, 2018|Categories: Apple|Tags: , , , , , |

Google. Facebook. Amazon. These tech giants collect data from us the moment we sign up for their products and services. Some information we willingly surrender (like our name and email address) and others they collect from the services we use (like the sites we visit or the people we contact). [...]

904, 2018

3 ways to ensure your FB data is private

By |April 9, 2018|Categories: Social Media|Tags: , , , , , , , |

The public went into a frenzy when reports surfaced that Cambridge Analytica, a UK-based data analytics firm, retrieved millions of Facebook users’ private information without their knowledge. But that doesn’t mean you can’t do anything about it, and here are 3 ways to guarantee your data remains private. Download your [...]

1408, 2017

Google’s preferred sign-in method

By |August 14, 2017|Categories: Google|Tags: , , , , , , , |

Last year, the National Institute of Standards and Technology removed SMS two-factor authentication from its list of preferred authentication methods. Since then, Google has encouraged users to use prompts-based 2-Step Verification (2-SV) methods instead. Find out why: Security was the main concern. According to Google, "This is being done because [...]

307, 2017

Google ridding MR from search results

By |July 3, 2017|Categories: Healthcare|Tags: , , , , , , , , , , |

Modern-day cyber criminals utilize every resource possible to launch attacks, one of which has been publicly available until now. Google had just overhauled its personal information policy, especially for the healthcare industry, resulting in the removal of private medical records from its search results. If an individual's medical records were [...]

806, 2017

6 Mac security tips and tricks

By |June 8, 2017|Categories: Apple|Tags: , , , , , , , , , , |

Although well aware of its importance, users still overlook Mac security. This might be excusable if you’re using your device just to watch cooking shows or to experiment with PhotoBooth, but not if it’s being used in day-to-day business operations. Deter internal and external threats from compromising your device with [...]

1312, 2016

Predicting cyber-threats in 2017

By |December 13, 2016|Categories: Security|Tags: , , , , , , |

As 2017 rolls in, the threat of more formidable cyber attacks looms large. Hackers and the cyber police will spend a lot of time outsmarting each other, while consumers of technology, individuals and businesses alike, anticipate the best security plan that can guarantee they sleep soundly at night. When it [...]

1802, 2016

Tips on Windows 10 privacy protection

By |February 18, 2016|Categories: Windows|Tags: , , , , , , , , |

Long gone are the days where private information (like vault combinations and the name of your high school crush) are kept confined within a padlocked journal. Speculation has been circulating that Windows 10 gathers more info than it should. Whether or not you think privacy lines have been breached, here [...]

2701, 2016

The Importance of Disaster Recovery

By |January 27, 2016|Categories: Business Continuity|Tags: , , , , , , , , , , , , , , |

Most business owners don’t normally think they will be a victim of a natural disaster...not until an unforeseen crisis happens and their company ends up suffering from thousands or millions of dollars in economic and operational losses -- all because of the lack of thoughtful disaster preparedness. This post gives [...]

2212, 2015

Business interruption insurance 101

By |December 22, 2015|Categories: Business Continuity|Tags: , , , , , , , |

While it is highly likely that you have an insurance policy that will cover your small or medium-sized business in the event of a disaster, chances are you don’t have business interruption insurance. The majority of smaller companies tend to overlook interruption policies, believing (or at least hoping) that regular [...]

Go to Top