Archive for 'Security Info & Tips'

How to Keep Your Data Safe from Hackers

How to Keep Your Data Safe from Hackers

Data breaches have become a real problem in the past few years. Giant corporations such as Michael’s, Target and even Bank of America have all had their issues with hackers stealing data from systems that were thought to be secure. With more and more of the world getting (and staying) online, these sorts of data […]

Full Story

Yahoo Email Suspicious Activity becoming the Norm

Yahoo Email Suspicious Activity becoming the Norm

Have you been notified by Yahoo due to suspicious activity on your email account? I am sure you have and it’s becoming far to frequent in the last year.  I have two accounts and I get notifications at least every other month about usual or suspicious activity on my email account. I have yet to […]

Full Story

Target and Michaels Credit Card Breach – What You Need to Know

Target and Michaels Credit Card Breach – What You Need to Know

Many of you heard about the credit card breach at Target and most recently Michaels the Arts and Crafts store. The good news, if there’s good news is that many banks, not all, offer free protection for credit cards and debit cards. Thank god my bank Chase is one of them. Online crimes are at […]

Full Story

Locking Down Your Network – When Part of the Network Is You

Locking Down Your Network – When Part of the Network Is You

Maintaining network security is challenging.  A constant stream of threats keep IT security professionals on their toes and developers busy anticipating and finding ways to block the next attack. And the new wave of wearable computing devices, such as Google Glass, is compounding the challenges that security teams face in protecting their networks and data. […]

Full Story

Cross Platform Security Threats Are More Dangerous Than You Think

Cross Platform Security Threats Are More Dangerous Than You Think

Most online security advocates place emphasis on DDoS, malware, viruses, ransomware and APT attacks, but merely highlight the dangers of cross platform vulnerabilities. However, there has recently been a rise in the number of hackers writing same vulnerability codes across different platforms – as they consider it a smart business. The cross-platform malware can also […]

Full Story

5 Interesting Facts About The Technology That Keeps Your Information Safe Online

5 Interesting Facts About The Technology That Keeps Your Information Safe Online

Online crimes, with a focus on identity theft, are some of the fastest growing crimes in the world and affect millions of people every single year. With international security companies racing to keep ahead of the criminals, those that use the internet may want to take a look at these five interesting facts about the […]

Full Story

6 Simple Email Security Tips Anyone Can Implement Today

6 Simple Email Security Tips Anyone Can Implement Today

Internet security can take many forms.  The key is assessing risk and identifying which online activities pose the most significant threat.  Anyone with an e-mail address is exposed to a variety of Internet security threats including malware, phishing, and spyware.  E-mail scams have become increasingly complex and more difficult to spot.  Fortunately, there are a […]

Full Story

3 Most Common Categories of DDoS Attacks

3 Most Common Categories of DDoS Attacks

The nature of DDoS attacks (Distributed Denial-of-Service Attack) has grown increasingly complex over the past 3 years.  In the past, the DDoS attacks were only associated with the brute force strategy designed to consume maximum amounts of bandwidth.  Since then, a variety of new tools have become readily available.  Not only has this allowed for […]

Full Story

6 Primary Levels of iPad Mini Security

6 Primary Levels of iPad Mini Security

The iPad Mini includes a host of built-in internet security features designed to keep users safe and online threats at bay.  It is vital every iPad Mini user understands the different levels of device security in order to gain maximum protection.  When looking at what the iPad Mini has to offer, there are 6 primary […]

Full Story

The First Lady Has Been Hacked! Does the Secret Service Need Supplementing?

The First Lady Has Been Hacked! Does the Secret Service Need Supplementing?

First Jay-Z then his wife, Beyonce. Hillary Clinton has been there, too. The same with LAPD big shot Charlie Beck. And now, the First Lady Michelle Obama. These notable names all have one thing in common – they’ve joined the estimated 8.572 million Americans who are victims of identity theft each year (1). How Did […]

Full Story

How to Protect Against Identity Theft and Identity Fraud

How to Protect Against Identity Theft and Identity Fraud

Online scams are a huge problem in today’s digital world. One of the most dangerous and most common threats out there is identity theft. This is when someone gets hold of your secure information like your I.D number, credit card number, password or email address and impersonates you for their own benefit. Usually this includes […]

Full Story

Buyer’s Guide to Acquiring The Best Electronic Signature Solution

Buyer’s Guide to Acquiring The Best Electronic Signature Solution

2013 marks the coming of a new era – the paperless era. Even Google is encouraging users to go paperless in 2013, not just for the sake of saving trees and environment, but for self-gains. And what precisely are these self-gains? That’s saving money spent aimlessly on paper and ink and the time spent on […]

Full Story