Common Security Breaches You Need to Be Aware Of
July 3, 2020
Common Security Breaches Common Security Breaches caused In 2016, search engine and email giant organization Yahoo had their system compromised by a data breach, resulting in stealing the information of about 500 million users. Yahoo isn’t the only victim of a security breach. Other examples…
0 Comments8 Minutes
Types of Firewall Architecture
July 1, 2020
Types of Firewall Architecture In its most basic sense, a firewall exists to prevent unwanted access to your computer network. Firewalls isolate your computer from the network with a layer of code that inspects all incoming and outgoing traffic. Whether attacks come in the form of malware hidden in…
0 Comments4 Minutes
10 Fun Facts About Canada Day
July 1, 2020
Canada Day! Canada Day long weekend is finally here. With the fireworks scheduled tonight, hamburgers on the grill, and cold drinks in the cooler, there is so much to love about our national holiday. Although most Canadians celebrate the national holiday in one way or another, many are not aware…
0 Comments2 Minutes
Secure Passwords |52% of users reuse their passwords
June 30, 2020
Secure Passwords Most Internet users these days still haven’t fully understood the importance of establishing effective mechanisms to create secure passwords. In order to understand how complex the risk is, researchers at Virginia Tech University and Dashlane analysts have carried out one of the…
0 Comments6 Minutes
What are White Hat Hackers?
June 29, 2020
Contrary to popular belief, not all hackers are malicious. Hackers use their skills to help protect against attacks are called “white hat”, while hackers looking to take down networks steal data, or compromise systems are called “black hat.” White hat hackers work to proactively find security…
0 Comments6 Minutes
Steps for Safe Computing and Online Privacy
June 26, 2020
Top 10 tips for safe computing and online privacy Protect your personal information. Be aware of schemes that ask for personal or financial information. Do not respond to unsolicited requests for confidential information. Choose effective passwords. Choose passwords that are difficult to guess…
0 Comments3 Minutes
How To Create Secure Passwords You Won’t Forget
June 25, 2020
How To Create Secure Passwords Safety deposit boxes for our valuables, security systems for our homes, kryptonite locks for our bikes, and yet the top two computer passwords people use in 2015 are “123456” and “password”. Does this sound counterintuitive? As an IT support and services company,…
0 Comments5 Minutes
Cybersecurity Tips to Keep Your Data Safe While Traveling
June 25, 2020
Cybersecurity Tips Cybersecurity Tips during your travels, it is easy to become so preoccupied with sharing your travel stories online that you forget to protect yourself against cyber threats. When it comes to cybersecurity, most people associate it with safe cyber practices at home, but…
0 Comments4 Minutes
Tips to lift your application security game
June 23, 2020
Application security What with ingenious data thieves and sloppy users, penetration testing is a good, and maybe essential, way to find vulnerabilities before the bad guys do. Even if a technology such as firewalls and intrusion detection systems protect 95 percent of an organization, “a…
0 Comments10 Minutes
Top 10 online scams: Watch out for these common red flags
June 22, 2020
Scams aren’t new; they’ve been around for centuries, even millennia. They are used to bilk unsuspecting people or to gain information or power. Nigerian princes want to give you money; Russian women think you’re cute; investment professionals want to let you in on a hot stock, or you’ll make a…
1 Comment9 Minutes