The risks of auto-complete passwords

The risks of auto-complete passwords

If you’re disturbed by advertisements and “helpful” suggestions that are based on your internet browsing habits, recent research has found yet another source of online tracking. It’s a sneaky tactic that also comes with serious security concerns.

Are the encrypted sites you visit safe?

Are the encrypted sites you visit safe?

You can easily tell whether a website is encrypted, and therefore safe, if a padlock icon appears next to its URL and if it starts with HTTPS (instead of just HTTP). Unfortunately, hackers now use the very same tool that’s supposed to protect browsers from malicious entities via encrypted phishing sites.

Security Best Practices To Adopt for 2018

Security Best Practices To Adopt for 2018

As 2017 draws to a close, it’s important to look forward into the world of cybersecurity for 2018. It’s worth mentioning that 2017 was the worst year on record for network security breaches, and all signs point to 2018 continuing the trend.

IT support and security should be top on the list of priorities for any business going into next year.

What you need to know about VPNs

What you need to know about VPNs

With stories of large-scale data breaches and internet service providers tracking internet habits, online privacy is becoming a rare commodity. Incognito mode and private browsing features may be able to cover up your browsing history, but they don’t completely protect your online activities.

Google weighs in on account hijacking

Google weighs in on account hijacking

According to experts, passwords shouldn’t be the only way you defend your accounts. After all, hackers have plenty of tricks and tools to steal them. So to help businesses fully understand the risks involved, Google conducted a study on the causes of account hijacking.

Watch out for the huge KRACK in WiFi security!

Watch out for the huge KRACK in WiFi security!

A fundamental flaw with WiFi networks has recently been discovered by two security researchers. According to their reports, the KRACK vulnerability renders advanced encryption protocols useless and affects nearly every wireless device. Read on to find out more about KRACK hacks and how you can defend against them.

Secure your passwords now

Secure your passwords now

For years, we’ve been told that strong passwords include three things: upper and lower-case letters, numbers, and symbols. And why wouldn’t we when the National Institute of Standards and Technology (NIST) told us they were the minimum for robust passwords? Here’s why and how it involves you.

5 Daily Habits of Cybersecurity-Conscious Employees

5 Daily Habits of Cybersecurity-Conscious Employees

Despite high-profile cybersecurity breaches hitting the headlines every month, many organizations have proven their unreadiness to take proactive measures to protect their data, their customers, and their employees. While Charlotte and Raleigh-area businesses should implement the latest and most reliable cybersecurity measures, none of them will ever become a substitute for good staff training.

Equifax’s Leak: lessons learned

Equifax’s Leak: lessons learned

No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident response, read the following story and recite this: Don’t walk in the footsteps of Equifax.