1011, 2017

Key security enhancements in Android 8.0

By |November 10, 2017|Categories: Android|Tags: , , , , |

Oreo is Android’s latest and greatest operating software to date. With sleek new enhancements such as a picture-in-picture functionality, smarter Wi-Fi toggling, customizable application notifications, and more, Android users have plenty to get excited about. However, its key security updates aren’t getting as much attention even though they’re just as [...]

711, 2017

Hackers exploit vulnerable Office feature

By |November 7, 2017|Categories: Office|Tags: , , , , , , , |

As the world’s most popular productivity suite, Microsoft Office tends to receive much attention from cybercriminals. Generally, hackers embed malware in authentic Office files to trick users into unleashing it onto their machines. However, the most recent exploit proves to be much more dangerous than any Office hack we’ve seen. [...]

611, 2017

Mobile devices and HIPAA compliance

By |November 6, 2017|Categories: Healthcare|Tags: , , , , , , , |

Mobile devices have revolutionized the healthcare industry: They’re convenient and significantly improve work efficiency and patients’ satisfaction. Yet they also come with risks. Patient data handled by those devices can be leaked. That’s why every healthcare provider needs to be extra careful about data security when using mobile devices. Why [...]

310, 2017

What you can learn from Equifax’s leak

By |October 3, 2017|Categories: Security|Tags: , , , , , |

When it comes to security, it’s better to be safe than sorry. But as the Equifax leak case has taught us, once a security breach does happen, it’s best not to be sorry twice. Read on so your business doesn't experience the same fate as the giant, bumbling credit bureau. [...]

210, 2017

Beware of healthcare IoT security risks

By |October 2, 2017|Categories: Healthcare|Tags: , , , , , , , , , |

The Internet of Things (IoT) has the potential to completely revolutionize the healthcare industry. Innovations like smart pacemakers and fitness trackers monitor patients’ vitals and unearth patterns that can lead to more accurate diagnoses. But like any new technology, it also brings a slew of security risks healthcare professionals need [...]

2709, 2017

How SaaS can benefit your business

By |September 27, 2017|Categories: Web & Cloud|Tags: , , , , , |

As technology progresses, more solutions are created to help businesses reduce costs and increase efficiency. One such solution is “Software as a Service,” aka SaaS. To know if this new solution can be of benefit to your business, you need to know first what SaaS actually is. Read on to [...]

3108, 2017

Critical Windows security updates from Microsoft

By |August 31, 2017|Categories: Windows|Tags: , , , , |

Earlier this month, Microsoft released a patch that includes several security enhancements and addresses 48 vulnerabilities for all supported versions of Windows. If you’re not in the habit of installing security patches when they come out, now’s a good time to start. Let's take a look at August’s updates and [...]

3008, 2017

New Locky ransomware: what you need to know

By |August 30, 2017|Categories: Security|Tags: , , , , , |

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of [...]

2908, 2017

Spyware has been infecting Macs for years

By |August 29, 2017|Categories: Apple|Tags: , , , , , , |

While Macs have a reputation for being more secure than Windows PCs, they are far from immune. Over the past decade, a piece of malware designed to spy on its victims’ computers has remained unnoticed until quite recently. What’s worse is that security experts are still unsure about how the [...]

2407, 2017

How to secure your IoT devices

By |July 24, 2017|Categories: Hardware|Tags: , , , , , , , , |

More firms are using the Internet of Things (IoT) to create new business opportunities. For instance, companies that install smart sensors can automate data entry and monitor their inventory. However, if left unsecured, IoT devices also give hackers an opportunity to breach your network. In order to keep attackers at [...]

Go to Top