IE security flaw exposed

As we increasingly come to rely on cloud-based systems, the browser will likely become even more important to business owners and managers. While there are a number of browsers out there, many Windows users prefer to use Internet Explorer (IE), largely because it is the browser which comes pre-installed on all Windows computers. However, if…

How to make secure passwords

Passwords are made to safeguard our online accounts. But in this day and age when rampant hacking incidents happen every day and around the world, security is oftentimes compromised. As a result, private data can fall into the wrong hands. For this reason, it is imperative that the passwords protecting your data are strong enough…

What you need to know about Heartbleed

The security of systems like servers and computers that connect to the Internet should be one of utmost importance for business owners and managers. However, there are always security flaws being exposed which could expose your systems and data to malicious hackers, who could really endanger your business. Over the past few weeks a massive…

What to do if malware is detected

Malicious software (more commonly known as malware) can be found on almost any system, most often being downloaded and installed on computers. It can cause a myriad of annoyances, like unwanted pop-ups and system freezing, and some forms can even gain unauthorized access to your PC, stealing personal information. It’s therefore essential that malware is…

Security strategy – do you audit it?

Security of a business’s systems and networks should be important to many business owners and managers. In fact, an increasing number of companies are implementing security strategies. While these strategies do keep businesses secure, there is one critical element that could cause plans to fail, leading to an increased chance of a breach of security:…

Spear phishing defined

There are numerous ways business security systems can be compromised. A common way is phishing – tricking people into giving up important information via email. Original phishing methods are now well known, and increasingly less effective. So hackers have become more skilled and have adapted their phishing methods into a new form of catching people…

The defense in depth strategy unveiled

Our computer systems need a high level of protection against harmful viruses, worms and other malware currently spreading like wildfire over the Web. If you have a layered security or defense in depth strategy in place, then you’re probably well protected. But if not, then our guide will surely help you protect your computer systems.…

Security of devices while traveling

The 2014 Olympic Winter Games is underway and athletes from all over the world have made their way to Sochi, Russia to compete. As with almost every other Olympic Games, there have been a number of issues for organizers to deal with. However, unlike the last Olympics, one of those complaints is about hacking of…

Define: Managed antivirus

Technology is becoming increasingly complex and many small to medium business owners and managers are finding it an increasing challenge to manage their systems, while also ensuring that they are secure. One way to prioritize security is to turn to an IT partner, many of whom offer managed antivirus solutions. While this is a viable…