Blog

  • 4 Crucial Tactics for Preventing Cyber Crime

    What Ben Franklin can teach us About Cyber-Attacks Everyone knows Ben Franklin famously said “an ounce of prevention is worth a pound of cure.” He also said “He that can take rest is greater than he that can take cities.” If you are stressing out over cyber-attacks, you will have little time to “take cities” – focus on whatever is […]

  • 3 Worst Cyber Security Mistakes and How to Fix Them

    Good cyber security experts can rattle off scores of things you may be doing wrong. And we generally appreciate it, at least the part that feels good that our systems remain nice and uncompromised. There is a limit though — unless you’re working for certain government offices or high-level security firms that can afford fancy […]

  • Can You Tell If Your System Has Been Infected?

    Technology and the Internet have become a part of everyday life. With the increased use of internet and technology users, there will also be more opportunities for IT hackers and thieves to cause damage to your business’s systems. As the dependence of technology and online tools continues to grow, there will be more online criminal […]

  • How Insecure Passwords are Leaving You Vulnerable

    When even Buzzfeed discusses poor passwords, you know there’s a problem. Those in the security business likely appreciate that mainstream attention is being given to this topic, but it also shows that the consistent lack of proper passwords has become “so crazy, you’ll never believe it!” Even after decades of so many people saying “it’s […]

  • Protecting Your Small Business From Internet Security Threats

    Some of the top security threats that a business can face include: privacy in the cloud, cyber crime, damages to a business’s reputation, and the constant changes in technology. It is vital, now more than ever, that small businesses are prepared and knowledgeable about cyber security. Where could you possibly start? A great place to […]

  • How the Internet of Things Will Affect Cyber Security

      One of the main things defining the Internet of Things is “something trendy yet mysterious.” Which means that not everyone quite understands IoT – especially non-tech people, but everyone thinks it sounds like something important. Think back to pre-Y2K days, when speculation ran the gamut from “nothing will happen” to “total meltdown of civilization” […]

  • Changing your Basic Corporate IT Security Behaviour

    If you thought that corporate IT security had got better in the last decade, you would be wrong. In fact, until 1992, it was against the law to use the Internet for commercial purposes. In February 2012, the New York Times, The Wall Street Journal and many other major media announced that they had been […]

  • 3 Cyber Security Threats to Safeguard Against

    Analysts seem to be scratching their heads about a lot of unknowns. The stock market continues to grow, but could reverse at any moment. Various financial experts seem to be taking bets on whether interest rate hikes will be “in awhile” or “sooner than you think.” But most people in the know are finding common ground […]

  • Internet Security Threats: Who Is Stealing Your IP Address?

    The IP (Internet Protocol) address is how the router you use is identified on the Internet. This address is tells anyone what sites you visit and your general physical location, which your ISP (Internet Service Provider) can narrow down to your specific account. ISPs will identify you by name, if subpoenaed. They may also identify […]