Every time you’re online and a site sends a separate code to check your identity, you’re using two-factor authentication. It has become the norm and if you are not doing this for all your online accounts then you should start straight away (check out our article on Why 2FA is Important). As with most things security wise, hackers have figured out how to get around the SMS code, too. This article shows you how they do it and how to stay safe. Continue reading →
You want to keep your IT in top shape. Your business technology supports both your productivity and profitability. You do not want to be dealing with downtime. It is also good to avoid running afoul of any industry regulations or standards. But how does a business gauge their IT fitness? That’s where IT audits, security assessments and penetration testing come in. Continue reading →
Hollywood films would have us believe that cyberattacks are elaborately planned and use expensive, sophisticated tools developed by hackers and geeks is sophisticated labs. But in real life, most hacks are nothing like that as the first steps cybercriminals take are to simply fool a human to gain access. Continue reading →
You may think it is a bit of fun to type in your answers to the quiz, which asks silly questions such as your nickname and first model of car? You may think it is some plain old fun, but many of these social media questionnaires are set up by hackers to steal your identity. Continue reading →
It is a sad but true fact that your employees are your number one cyber-security threat.
They are often the main gateway through which hackers gain their way into your business. All it takes, is one staff member clicking on one wrong link in an email, for cyber-criminals to get in. Continue reading →
Proprietary information makes your business special, whether you’re a startup with a unique take on an area or a food manufacturer with a secret sauce. Regardless of industry, businesses gain a competitive advantage from distinct practices or unique data. The last thing you want is someone with ill intent getting their hands on your differentiators. Here are some tips on how to protect your proprietary information. Continue reading →