The Scoop on Two-Factor Authentication

May 25th, 2013

Twitter recently announced that it now supports two-factor authentication (or 2FA), but it’s far from the first website to encourage users to use it. Google, Facebook, and Amazon are just a few of the companies that currently use 2FA to prevent hacking attempts.

The Top 25 Passwords Used and Why You Shouldn’t Use Them

May 18th, 2013

A list was released in the past few months that included the most commonly-used passwords of last year. These passwords, and any variation of these passwords, are some of the passwords that will be tried first when a hacker is attempting to get into an account.

Keeping Your Phone Safe from Cyber Attacks

May 16th, 2013

You may think it’s a little outlandish that you have to protect your phone from cyber attacks, but unfortunately, celebrities aren’t the only people who get their phones hacked. In reality, it’s much easier than anyone thinks, and even an amateur can manage to get into your voicemail or view your smartphone’s browsing history.

Email Fraud: How to Stop It

April 30th, 2013

With hacking attempts, DDoS attacks, and stolen data becoming more prevalent as of late, it’s more important than ever that you and your employees exercise the proper protection techniques. This starts with knowing what to look out for. Since we all use email regularly to communicate with others, it makes sense to start there when it comes to protection from hacking attempts.

Windows XP and Office 2003 Support is Ending in One Year

April 4th, 2013

Two of Microsoft’s flagship services are going to no longer have any support as of April 8th, 2014: Windows XP and Office 2003.

So what does this mean for the business owner that depends on these products to run their business? Microsoft simply says it means you should “take action”. There will no longer be any security updates or assisted support options, online or otherwise, through Microsoft.

How to Protect Your Network from a Breach

March 15th, 2013

If your network gets breached, it can cost you some serious cash to get it handled. A lot of small businesses, especially startups, simply don’t have that kind of money to hand out to fix the problems caused by a breach. When data is lost, not only do you need to reach out to your customers, you have to handle the massive amount of fallout that happens in response.

Office 365 Free for Up to Six Months

March 13th, 2013

Are you back in school trying to get a new degree, or do you still use your .edu email? Here’s an offer that’s hard to refuse: free Office 365.

For qualifying .edu accounts (one that came from actual colleges), Microsoft has decided it will start offering free Office 365 with full functionality for three months.

$100,000 to Researchers Who Found a Windows Vulnerability

March 11th, 2013

Google has always been good about offering money to those who find vulnerabilities in their systems, and this particular case is no different. MWR Labs has won a $100,000 prize for finding a way to get into Windows from Chrome.

The Pwn2Own competition takes place every year in Vancouver.

Why is My Internet So Slow?

March 7th, 2013

You’re zipping along on the Internet and suddenly you’re struck by a slow Internet connection. You have no idea why, and it’s not immediately obvious how to fix it. You know something has to be hogging your bandwidth, but you’re not sure what, and in some cases, who.

Malware Gaining “Intelligence”

March 2nd, 2013

Naturally, the malware market is still growing in volume as more and more people decide that there’s money to be had in the market. However, malware isn’t just growing in volume, it’s growing in sophistication, too.

McAfee’s fourth quarter report from last year that gauges threats has indicated that more and more organizations, large and small, are being targeted by clever and sneaky cyberattacks.