Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by the US government. The released documents claim that the vast majority of these efforts took place via smartphones, messaging apps and…TVs? Let’s see just how worrisome they really are. What devices and apps are supposedly vulnerable? Wikileaks labeled its ongoing release of …
Vulnerabilities on WordPress websites
“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress websites, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, “easy to target,” “hackers’ favorite,” and “prone to attacks” could soon be used to define the experience of running a WordPress website. WordPress …
Browsers leak sensitive info to hackers
The Autofill feature fills a void in the web browsing habits of many. It eliminates the need to enter all your sensitive info when logging on your social media accounts or when checking out your basket after e-shopping. On Chrome and Safari browsers, however, danger lurks when you rely too much on autofill. Without knowing it, you may be exposing …
Cyber security and managed services
Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact. What’s certain is statistics don’t lie, and as much as you’d like to …
The state of web services in 2017
It’s 2017, and it’s time to start thinking about what information technology will look like for the rest of 2017 and going forward into 2018. That could mean anything from forecasting the costs of adopting new technology to upgrading your products to better integrate with new trends. Whatever it may be, we’re putting down our predictions for how to get …
2 types of security authentication explained
Cyber security is becoming more and more important in an increasingly digital age. While many people and businesses know how important their online security is, they may not know what types of online security are best, nor the differences between the most commonly available options. There are two security authentication measures that are quite similar in name and that are …
How web monitoring increases productivity
The internet is undoubtedly one of the most powerful tools for improving business productivity. But it’s also a magnet for procrastination. With unfettered access to the internet, it’s easy to stray away from your important work responsibilities. If done in moderation, five-to-ten minute breaks on Facebook, Twitter, and YouTube are harmless, but if employees spend several hours a day there, …
Social engineering and cyber security
Social engineering is the ability to manipulate people into wilfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don’t have a clue about what is happening. Avoiding it …
Choosing a cloud provider
Many businesses are now looking towards “cloud computing” to provide them with the IT systems and services that they would have previously had in their office. Cloud computing encompasses many different technologies and services with a huge variety of “as a service” providers. This presents a considerable number of challenges for businesses over security, reliability, backup, performance and costs as …
5 Big Security Threats you could face in 2015
2014 was completely disastrous from a security point of view for companies and people alike. Apple’s iCloud breach saw private celebrity photos leaked, the most memorable security breach of 2014 was Sony Pictures who was thanks to a breach in Apple’s iCloud, Sony Pictures was the victim of it all but crippled the company and the public at large found itself …