encryption

How to wipe data from your old smartphone

Our mobile phones contain some of our most private data. There are contact details, confidential business emails, financial information, and…

7 years ago

Chrome to mark HTTP as ‘not secure’

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will…

7 years ago

Cybersecurity approaches to keep PHI safe

Healthcare organizations have always kept the possibility of data breaches in mind, especially since 2017 witnessed the biggest and most…

7 years ago

The importance of HTTPS

Very few internet users understand the meaning of the padlock icon in their web browser’s address bar. It represents HTTPS,…

7 years ago

Protect Your Mac from Security Threats

Mac users follow certain steps to maintain privacy and protect company data. But if you’re too busy or short on…

7 years ago

Phishers use encrypted sites to scam

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing…

7 years ago

macOS High Sierra gives away your password

A glaring security mistake has been discovered in Apple’s most recent desktop operating system. It’s not the sort of vulnerability…

7 years ago

How Will Blockchain Affect Healthcare?

New IT trends are usually equal parts exciting and confusing. Today, that generalization describes blockchain technology perfectly. It’s a complex…

7 years ago

How to reduce data loss in Office 365

For businesses, the security of sensitive data is critical. If this information is lost or stolen, it could lead to…

7 years ago

Is the government really spying on you?

Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by the US…

7 years ago

This website uses cookies.