
Your password may be poor — update it now
For years, we’ve been told that strong passwords include three things: upper- and lowercase letters, numbers, and symbols. And why wouldn’t we when the National

For years, we’ve been told that strong passwords include three things: upper- and lowercase letters, numbers, and symbols. And why wouldn’t we when the National

What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who presents their findings

While many IT providers tout the revolutionary benefits of the cloud, very few address the security aspect of it. The fact is, when you’re using

Most managed IT services providers (MSPs) promise “proactive” cybersecurity consulting. Businesses large and small embrace the idea of preventing cyberattacks and data breaches before they

Although it is important, security is something that some Mac users overlook. That’s fine if all you do is watch YouTube videos or experiment with

Why do hackers attack? Is it for money, notoriety, or political reasons? As a business owner, you should always try and find out the motive

The Rio Summer Olympics took place years ago, but the hackers who infamously used social engineering to exploit the event are still with us. Although

Keeping your personal and professional information safe from cybercriminals is not easy. It takes constant vigilance and frequent training. There are dozens of simple tools

The bring your own device (BYOD) strategy lets employees use their personal mobile devices to do work for your company from anywhere. This strategy increases