June 2018

What to do in case of a website breach

Big companies like Yahoo, Target, and AOL are often at risk of data breaches because of the large volume of data they collect and store. And when a data breach occurs, individual users are the ones hardest hit. Luckily, there are a few things you can do to mitigate damage from disastrous data breaches. Determine […]

What to do in case of a website breach Read More »

Business, , , , ,

SMB routers targeted by VPNFilter malware

Earlier this year, news broke that a malware strain named VPNFilter was infecting hundreds of thousands of devices. If you didn’t act then, now’s the time. Security experts have updated their threat assessment and its much worse than they originally thought. Small businesses are especially at risk and need to take action. VPNFilter recap A

SMB routers targeted by VPNFilter malware Read More »

Security, , , , , , , ,

Apple WWDC 2018: News and updates

The Worldwide Developers Conference (WWDC) has developers meeting and joining discussions with more than a thousand engineers from Apple. What new products did the computer manufacturer have in store for consumers? Read on to find out! A more personal, faster iOS 12 Apple has focused on improving the operating system’s performance so that iPads and

Apple WWDC 2018: News and updates Read More »

Apple, Business, , , , , , , ,

Hide & Seek malware: What you need to know

What’s the worst thing that could happen to your Internet of Things (IoT) devices? If you guessed ‘getting infected with malware,’ you’re right. Many users think IoT gadgets don’t need the same protections required for PCs, laptops, and smartphones — but they do. There’s a new malware strain that attacks IoT-enabled devices, and you need

Hide & Seek malware: What you need to know Read More »

Business, , , , ,

Chrome: From HTTP to HTTPS

Within the last year, Chrome has helped users understand that HTTP sites are not secure. More websites use HTTPS, a safer protocol, than ever before. So, how can you benefit from this transition? Find out here. For several years, Google has moved toward a more secure web by strongly advocating that sites adopt the Secure

Chrome: From HTTP to HTTPS Read More »

Google, Security, Web & Cloud, , , , , , , , , , , , ,

How app overload reduces work productivity

Blessed are today’s businesses for having the benefits of technology to make operation more efficient. Apps have been a big help in streamlining business processes across industries. But at the same time, these programs may cause error and confusion when unorganized — and that translates into lowered productivity. How app confusion occurs A new study

How app overload reduces work productivity Read More »

Business, , , , , , ,

Facebook: 4th favorite choice for teens

Facebook is no longer the most popular social media platform for US teens. According to a recent survey by Pew Research Center, only 51% of US teens aged 13 to 17 years are using Facebook. This is much lower than the shares for US teenage Snapchat users (69%), Instagram users (72%), and YouTube users (85%).

Facebook: 4th favorite choice for teens Read More »

Social Media, , , , , , ,

Office 365 will block Flash by 2019

Microsoft recently announced plans to eventually stop the activation of Silverlight, Shockwave, and Flash content in Office 365. This is not just the developers disabling bugs with an option to click a link or button to look at content. Within a few months’ time, Flash will be gone from Office 365 for good. What media

Office 365 will block Flash by 2019 Read More »

Office, Security, , , , , , ,

Mitigating healthcare insider threats

The healthcare industry is unique in that the biggest data security threat comes from insider breaches.The main reason for these unauthorized hacks is financial gain. So how can healthcare organizations protect themselves against insider threats? Read on. #1 Educate – The workforce (meaning all healthcare employees) must be educated on allowable uses and disclosures of

Mitigating healthcare insider threats Read More »

Healthcare, Security, , , , ,

Nation-state hackers inflict destructive malware

A destructive, new malware has surfaced in at least 500,000 home and business routers across 54 countries. Security researchers warned that the infected devices could “self-destruct” as the said malware named VPNFilter can maintain presence even after a successful reboot. How VPNFilter Works Talos cited the vulnerable devices as Linksys, MikroTik, Netgear, and TP-Link networking

Nation-state hackers inflict destructive malware Read More »

Security, , , , , , , ,
Scroll to Top