13 Cyber Security Truths To Live By img

13 Cyber Security Truths To Live By

#1 It’s Not A Technology Problem. It’s A People Problem When it comes to security, your organisation is very similar to a house. For protection, you have doors, locks, windows and fences. To detect threats, you have alarms, motion detectors, monitoring and crime watch. To respond to threats, you might have a dog, a gun, the help of local police …

Yes, GDPR Can Affect You – Here’s What You Need to Know

Yes, GDPR Can Affect You – Here’s What You Need to Know

The European Union’s General Data Protection Regulation, better known as GDPR, swung into full enforcement May 25, 2018. It was enacted to offer certain protections to EU citizens regarding their personal information. Though it was passed two years ago, SMBs and corporations without an international business model largely ignored it until the enforcement went into effect a month ago. You …

The Real Solution to Downtime and Costly IT Repairs

The Real Solution to Downtime and Costly IT Repairs

Natural disasters and even mistakes by employees can bring your operations to a halt. No matter the reason, this downtime disrupts operations and reduces your profit. Even if your systems are up 99.99% of the time, that’s still more than a full day’s work over the course of a year. Technology should not dictate your productivity. Take control of the situation with a more …

The Real Costs of Downtime

The Real Costs of Downtime

Imagine yourself laying on a warm beach, cool breeze coming off the ocean, refreshing drink in hand. You’re soaking up the sun to get a “healthy” tan to show off when you get back home after vacation. Skin cancer isn’t on your mind. Heck, you’re not even worried about getting a sunburn. It won’t happen to you, you say to …

5 Tricks to Avoid Downtime

5 Tricks to Avoid Downtime

“Penny wise, pound foolish.” This British saying has endured through time because its wisdom holds true even today – particularly when it comes to technology. Nothing kills the bottom line like downtime. Often, downtime is easily prevented but, someone along the way decided to “save money” instead. Like the business owner who hired his brother-in-law to manage the IT department …

Hacks to boost the speed of your WordPress site

Hacks to boost the speed of your WordPress site

We’ve all experienced the frustration that comes with a slow-loading website. While 10 years ago, we would have waited patiently as a site loaded with all the urgency of a sloth, today’s internet surfers won’t hesitate to close the tab. Most expect at least a three-second load time, while some won’t settle for wait times over two. So how can …

Keeping your email safe

Keeping your email safe

If you think your email is safe from hackers, think again. A lack of sufficient email security measures can result in data theft, unauthorised access to sensitive information, and malware attacks. Here are some tips to secure your email account from unwanted intruders and the many troubles that come with them. Use separate email accounts Most people use a single …

Major FBI Website Warning

Major FBI Website Warning

According to Cyber Heist News, the FBI’s Internet Crime Complaint Center (IC3) released a PSA warning that attackers are exploiting people’s trust in sites that use HTTPS. Cybersecurity training has in the past rightly encouraged users to look for the lock icon next to the URL in the browser, but many users still believe this icon is proof that the …

Tips for safeguarding business data

Tips for safeguarding business data

You can’t afford to lose business data. It takes away the trust of your clients, leading to loss of revenue. Cybercriminals are here to stay, so it’s more important than ever to utilise tight security measures to keep your business data safe. Still, some hackers may have advanced cracking skills, or are really determined to break into your network, so …

Boost online security with browser extensions

Boost online security with browser extensions

Protecting yourself, your employees, and your business when you’re using the internet is necessary if you want to remain safe, productive, and profitable. Given the proliferation of phishing attacks, hacks, and online fraud, we all need to ramp up our online security measures. Here are some ways to bolster security using browser extensions. Prevent browser tracking If you don’t like …

2-step and 2-factor authentication

The basics on 2-step and 2-factor authentication

Cybersecurity is a vital component to businesses these days. You need to make sure that criminals cannot just hack into your network. When it comes to verifying users’ identity, there are two types of authentication used: two-step and two-factor. These two are so similar, many confuse one with the other. Learn the difference between the two, so you’re more knowledgeable …

protect yourself from cryptojacking

How to protect yourself from cryptojacking

Hackers use cryptojacking to mine cryptocurrencies, and this process can cause PCs to run below optimal speeds.  If you have a relatively new computer but are experiencing performance problems after clicking a link or visiting a website, you might be a victim of cryptojacking. Here’s what to do. Hijacked hardware Instead of paying for computing power themselves, hackers opt to …