KRACK hacks: What you need to know

KRACK hacks: What you need to know

You’ve heard of ransomware, denial-of-service attacks, and even phishing, but one hacking technique you may not have heard of is the KRACK exploit. This attack takes advantage of a vulnerability in WiFi networks, which puts any device with a wireless connection at risk. Here’s everything you need to know about KRACK. What is KRACK? Simply put, KRACK, short for ‘key …

Guest Wi-Fi 101

Guest Wi-Fi 101

No matter who they are, people today expect Wi-Fi access when they’re guests of your office. Setting up your Wi-Fi the wrong way can create a tedious experience for them and even expose your confidential information. So what’s the right way to do it? Never give guests access to your primary Wi-Fi While giving guests password to your company’s main …

Google launches new Backup and Sync app

Google launches new Backup and Sync app

Employees don’t usually prioritize managing files and photos because they can be tedious and time-consuming. Those who have to deal with a high volume of files and photos across different devices often depend on the auto-sync functions of Google Drive or do manual backups on external drives or SD cards. With Google’s nifty new application, managing files and photos is …

How to secure your IoT devices

How to secure your IoT devices

More firms are using the Internet of Things (IoT) to create new business opportunities. For instance, companies that install smart sensors can automate data entry and monitor their inventory. However, if left unsecured, IoT devices also give hackers an opportunity to breach your network. In order to keep attackers at bay, we advise you take the following precautions with your …

How to defend against WannaCry

How to defend against WannaCry

Both businesses and individuals across dozens of countries were scrambling to fix their computer systems after a ransomware, named WannaCry, caused major disruptions last year. Like most ransomware, WannaCry encrypts files and demands a Bitcoin payment for their release. What’s worse, more WannaCry variants will likely be developed in the near future, according to security researchers. Fortunately, there are some …

Did Microsoft commit a security breach

Did Microsoft commit a security breach?

In case you didn’t know, Microsoft provides Office 365 users with a free document-sharing platform called docs.com. It’s a great new tool for publishing files intended for public viewing. The downside is, sensitive documents are published without the file owners’ permission. These include hundreds of users who might be unaware that their private files can be viewed by the public. What’s …

Skip the Bad News About Cyberthreats. This Is Worse.

Skip the Bad News About Cyberthreats. This Is Worse.

Would you jump out of an airplane without knowing how to operate your parachute? We’re guessing the answer is, “Heck No!” Yet, that’s what company leaders do every day they operate without a comprehensive cyberattack mitigation and response system—including the expertise to minimise damage after a cyberthreat breach. Researchers at the Ponemon Institute have discovered that while 86% of business …

What you need to know about Cloudbleed

What you need to know about Cloudbleed

Internet security company Cloudflare revealed a major flaw in their system. The so-called ‘Cloudbleed’ vulnerability leaked customer information from thousands of websites, according to Cloudflare researchers. Fortunately, there have been no signs of exploitation, but that doesn’t mean you should be complacent. Here’s everything you need to know about Cloudbleed. What is Cloudbleed? Although it’s technically similar to Heartbleed, a …