IT Talk Your Business Can Rely On

Archive for security

2016’s possible security problems

As shown by recent high-profile hacking scandals - targeting everyone from Sony Entertainment to the extramarital-affair-facilitating website Ashley Madison - cyber crime shows no sign of[...]

Read More

Twitter alerts users to cyber attacks

Something known as “state-sponsored cyber attacks” may not be something you have heard of until now. But with both Facebook and Google viewing the problem as serious enough to warn their users about,[...]

Read More

How Google overcomes secure browsing issues

It’s safe to say that malware attacks, phishing scams, and social media engineering practices are going nowhere fast. That means that, whether you are a home user or the owner or manager of a small[...]

Read More

Secure your SMB by following these rules

Sufficient security policies can make or break your small or medium sized business. But the truth is that many SMB owners are unsure as to the type of security measures needed to protect their[...]

Read More

Vulnerability exposed by WhatsApp bug

News that a potential security threat in the web-based version of WhatsApp left up to 200 million of its users with their data exposed to hackers and malware acts as a reminder to us all to be[...]

Read More

Takeaways from the Ashley Madison hack

Regardless of what you think about the Ashley Madison hack, it is big news when it comes to data security. While your company may not be as big or deal with such a sensitive topic like Ashley[...]

Read More

The different types of malware: explained

Ever been infected by malware or a virus? For most internet users, the answer is probably yes. But what is the difference between all the cyber threats out there? What makes a virus different from a[...]

Read More

MasterCard’s new selfie verification

Love them or hate them, selfies are here to stay. And with facial recognition technology becoming both more advanced and more mainstream, selfies have now found their way into the online security[...]

Read More

Google boosts security with physical keys

If your business is lacking adequate security protection, the doors are wide open to an attack from outside. To make things worse, security threats are constantly evolving and developing, rendering[...]

Read More

How to transition to the cloud securely

Cloud computing marketing can be deceiving. When you see an image of the cloud, it’s often a happy, bubbly white puffball floating delightfully in front of a blue sky background. Its presence is both[...]

Read More
« < 1 ...
3 4 5 6 7
> »