Many of us are using Google Drive to store data in the cloud and, with a new initiative announced on the Google Drive blog, you can store even more of your files and folders online.
Promoting Internet Security Day, Google is offering 2GB additional storage to any user who completes a free online security check. The check, which takes around two minutes, includes stages to confirm your verification options, backup email address and security questions. It is also possible to see all the applications that can access your Google account in one convenient screen.
You can complete the security check at https://security.google.com/settings/security/secureaccount
Since attackers understand that data is an essential asset, it is no surprise that encrypting your data and holding it to ransom has become a significant security threat. Ransomware presents a serious problem and, under pressure to pay ransom within a limited period of time, many people see no alternative but to comply.
The reality is that dealing with ransomware is difficult. The most effective solution is to stay protected and avoid infection in the first place. Across your PCs and mobile devices, run regular malware scans and carefully check applications before you execute them. Take a stance of suspicion when it comes to email attachments, and trust nobody unless that trust is earned.
Finally, be sure to keep regular backups so you can retrieve your own data from an alternate source.
Apple uses the 4 pillars for mobile security to protect. Protecting against threats is always going to be an ongoing battle with threats. Attackers always have a plan on what to do and how to do it. They are also changing up their game plan to find different ways to attack our phones and computers.
Here are the 4 pillars that Apples uses for mobile security:
- Data at rest-File Vault, for Mac is a feature in the OS X. This protects the data without hurting the system performance or battery life. It is a hardware that encrypts data at rest that is enable by default.
- Data in transit- To secure data in transit, Apple devices can connect via VPN to secure it. There is also no additional software required to take advantage.
- Application security- Apples reviews all software that is submitted to the App Store and find any malware. OS X and iOS are built to reject any software that lacks a signature.
- Patching- Ever since computers, all software have some bugs or defects. With these defects and bugs, attackers can use it to get the information they need.
Apple has recently up their security features with the iPad, iPhone, and Mac. They have been known for their designs and intuitive functionality. With the looks, you also have to have the security to make sure you’re protected. Apples offers a combination of ease of use, privacy controls, and great IT security. What is better than that?
Are you aware of blind spots in your network?
So let’s say you are an owner of a large local bakery and one of your employees stole one of your famous recipes, and there are three exits for your bakery. You have a security guard at each exit to search each employee that leave the premises. So you would be certain to who stole your famous recipe right?
Now say that the security guards lack at doing their job right. They just check each employee’s pockets and make sure they don’t have any papers in their hands. But what about the employees who come to work with a bag or a purse. Would you be certain they would catch the thief who stole your recipe?
The life inside the enterprise network is very similar to the story above. You think you have the tools to protect what is going on in your network but it is lacking some of the important rules.
Consider the following:
- There is an expanding amount of websites that compelling SSL by default.
- There is a report that NSS Labs announced that 25% to 35% of the ongoing traffic enterprise networks is SSL-encrypted.
There is so much ongoing traffic that you have to make sure you are secure at all times. If your security guards don’t do their job right, who will.
For more information click here.
The Bitdefender Box is a device that promises to protect every device you have, which include your computers, tablets, and phones. Bitdefender Box purpose is to detect and block potential security threats. This is a great device to invest your money in and protect all your devices. It is a sleek, nice little box that can fit perfect right on your desk. The Bitdefender Box router can also stop threats before they can even reach your computer.
The cost for the Bitdefender Box is $199 and a required annual subscription of $99. Yes, it could be pricey but you pay for what you get, and you are getting something to protect your devices. So, it is only best to get the Bitdefender Box to protect all your devices from threats. It is a choice you will not regret. Especially with the first year being free.
Bitdefender Box separates itself from most routers by being frequently updated with new information to help protect from the threats, while on the other hand you have your traditional router that has occasionally updates and it can be difficult for users to install.
To find out more information about the Bitdefender Box, click on this link.
Microsoft’s new and enhanced keyboard was announced on Monday, March 2nd, 2015. The keyboard will go on sale in July at the Microsoft Store and many other retailers for $99.95. This new keyboard is perfect for on the go and very lightweight to carry around anywhere.
It folds neatly right down the middle with magnets to keep it closed so you could carry it around in a bag. When you unfold the keyboard, it automatically powers on and connects wirelessly to Bluetooth for tablets and also your cell phone. You can also switch between your devices with just one button. With the keyboard being spill resistant, who wouldn’t want this keyboard?
The battery for the keyboard should last up to three months on a single charge. With this battery you would only have to charge it every three months and you would not have to worry about it after that.
It is the perfect accessory to have when you are writing a few emails at the coffee shop or on your lunch break from your tablet or cell phone, or even both at the same time.
For more information on this new keyboard, click on this link.
Leonard Nimoy passes away at age 83, on February 27th, 2015. Mostly known for playing the role of Spock in the “Star Trek” movies and television series. Leonard passed away in his home in Los Angeles California due to Chronic Obstructive Pulmonary Disease.
Leaving his wife Susan Bay and two kids, Adam and Julie Nimoy behind. Susan confirmed his death saying the cause was end-stage chronic obstructive pulmonary disease.
Millions of people will be missing Leonard. It is sad to see someone so great leave so soon.
For more information about Leonard Nimoy’s death, click here.