security

7 Infamous Cloud Security Breaches You May Not Know About…

Pro wrestling giant WWE was recently the victim of a security breach leaked personal data for 3 million customers. Hackers reportedly gained access to the information after striking a database left unprotected ...

Screen Shot 2019-12-12 at 1.18.00 PM

What Are Firewalls and Why Do They Matter?

What are firewalls, how do they function, and why do they matter? Let’s discuss. Firewalls are essential for both personal and professional use, but why? Also, what exactly is a firewall? I’ll explain both of...

Mozilla Stops Facebook Tracking With a Firefox Add-On

  Mozilla Stops Facebook Tracking With a Firefox Add-On   “You can continue to use Facebook as normal, but Zuckerberg can no longer track you around the web.” – PC Mag’s Matthe...

The Best VPN Services of 2018

“A virtual private network is the best way to stay anonymous online and to secure your web traffic. We’ve tested more than 50 VPNs, and these are our top performers” stated PC Mag’s, Max...

Simplify MDM device enrollment for users

MobileIron’s mobile device management (MDM) will give you the fundamental capabilities to control, secure, monitor and manage any corporate or employee-owned mobile device or desktop that accesses that bu...

Are you promoting a safe Network?

On average, organizations take about 200 days to identify new ransomware threats. In combination with aging hardware, out of date software, poor network monitoring, and lack of professional IT assistance, this ...

What/Why/How – you should always use a VPN

What is a VPN? A virtual private network creates a secure tunnel between two sites via the Internet to protect your privacy. This is usually a paid service to ensure web browsing is secure and private while usi...

Luggage Tag Code, Gives Identity and Flight Info to Hackers

Researchers from German security company, Security Research Labs, recently revealed the poor security behind the current travel booking systems. Three of the largest Global Distributed Systems (GDS) handling fl...

Shopper Safety – Beware of Fake Apps and Wifi Hotspots

Now that holiday shopping is upon us, security researchers are handing out advice on how to protect yourself and your information from cyber hacking. More and more shoppers use their smartphones while they are ...

Two Factor Authentication – What is it?

Two Factor Authentication, or 2FA, takes a combination of generally accepted forms of authentication to further secure your login to big sites and applications such as Facebook, Microsoft, Google, Apple iCloud ...