Network Security

Reset your Dropbox password

Remember in 2012 when Dropbox’s data, which contained details of around two-thirds of its customers, were leaked? At the time,…

7 years ago

4 Social engineering scams to watch out for

Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will…

7 years ago

Set your ransomed files free, for free

In computers, as in war, encryption is a way of encoding sensitive information so only authorized parties can make use…

7 years ago

5 simple but manageable security measures

Don’t be put off by the tech jargon of security experts you find in forums and self-help books. A managed…

7 years ago

WordPress 4.5.3 fixes several security bugs

WordPress is one of the most popular and reliable content management systems on the market, and for this reason it…

7 years ago

Spoofed email takes down NBA team

The NBA Finals may now be over but for one team, the losses keep coming. Yahoo! Sports reported that the…

7 years ago

Ransomware adopting self-replication

Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite…

7 years ago

New security flaw in popular image uploader

ImageMagick, one of the internet’s most widely used image processing services, is susceptible to attacks that may put your site…

7 years ago

Different types of hackers defined

Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details…

7 years ago

How is BYOD a security risk?

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company…

7 years ago

This website uses cookies.