What is Two Factor Authentication?

Despite its techy-sounding name, two factor authentication is one of the simplest ways to keep your information secure online. But what is two factor authentication, exactly?

Read More

The History of Computer Viruses: a Quick Lesson

Computer viruses didn’t just manifest through natural means like biological bugs. They’re manmade, of course. But where and why did they start? This lesson on the history of computer viruses will...

Read More

Should I Encrypt my Phone? If So, How do I do it?

For some reason, many people are under the impression that their smartphones are invulnerable to cyberattacks. That’s a dangerous assumption, especially with the increasing threat of ransomware....

Read More

6 Actionable Ransomware Prevention Tips for Safer Data

Recently, we wrote a blog defining ransomware and detailing the threat it poses to the cybersecurity of businesses. After learning about it, most people seek out ransomware prevention methods to...

Read More

What is Ransomware, and Why Should You Care?

Viruses like Locky and CryptoWall are plaguing the Internet. These malicious cyber-infections are known as ransomware. But, what is ransomware, exactly? And, perhaps more importantly, why should...

Read More

4 Data Breach Protection Tips for Small Business Owners

As the frequency of malicious software attacks increases, so too does the importance of maintaining strong cybersecurity policies. For most small businesses, a data breach signals disaster. But,...

Read More

Locky Virus: The Latest Ransomware of 2016

While its name sounds kind of silly, the Locky Virus has been one of the most active and dangerous malwares of 2016. One of the latest examples of ransomware, Locky essentially holds your files...

Read More
1 ... 2 3 4 5 6