Apple Provides Critical Update To Address Security Flaws in AirPort

The latest Apple Update for Security have been released by Apple for AirPort Base Station, their wi-fi enabled routers and devices. Affected models are AirPort Express, AirPort Extreme, and AirPort Time Capsule base stations with 802.11n and 802.11ac. In order to ensure the security of your personal information, I would recommend visiting the Apple security page for AirPort Base Station …

Insider Threats: How to Counter Internal Cybersecurity Risks

If you ask people about cybersecurity, they will probably start talking about hackers breaking into a company’s computers from hundreds of miles away. However, a threat just as destructive could be hiding inside that company’s offices. This is commonly referred to as insider threats. These insider threats typically fall into two groups. The first group consists of careless employees who …

iTunes Scam Text Messages Spreading Malware

The latest iTunes Scam has been reported. Malicious individuals are reportedly sending scam text messages claiming to be from Apple’s music service iTunes to a large number of people. The message is believed to claim the recipient’s iTunes account has been frozen and asks them to click on a link to ‘validate their [iTunes] account’. However, people who click on …

Wearables

The Advantages and Challenges of Using Wearables in the Workplace

In the past, wearable computing devices, commonly known as wearables, were primarily used for health purposes. Runners, for example, would use them to track their vital signs as well as the distances they ran. Products like Android Wear and Apple Watch, however, have pushed wearables out of the health niche and into popular culture. These devices are not limited to …

Cloud Service Providers

How Cloud Service Providers Can Prove Their Data Security Claims

Cloud service providers (CSPs) often claim that their customers’ personal data is secure in their clouds. You can now check to see whether that is the case, thanks to a global standard published in 2014. People often refer to the standard as ISO 27018 but its official title is “ISO/IEC 27018:2014 — Information technology — Security techniques — Code of practice …

Password protection

Password protection, is your password secure enough?

Password protection is essential to avoid hackers into your private and personal data. On Tuesday, the password-management company SplashData released its annual list of the most popular passwords of the past year. SplashData took a look at the more than 2 million passwords that got leaked last year, analyzing the most commonly leaked passwords and those that were least secure. Most …

What Surveys Say about Moving to the Cloud

Cloud computing has surged in popularity. The 2015 Cloud Security Spotlight Report clearly makes this point. More than 70 percent of the 1,010 participants reported that they use or plan to use a cloud computing solution. Yet, some organisations are still apprehensive about using the cloud. Common Concerns Organisations hesitant about cloud computing are often concerned about: Security. Security is …

6 IT Policies To Help Protect Your Company

Many companies rely on IT to help run their businesses. For this reason, they often depend on a set of IT policies to ensure the productive, appropriate, and legal use of IT resources. IT policies establish expectations and regulations for behavior related to company computers and networks. In addition, IT policies detail consequences for employees or customers in the event …