Blog

Are autocomplete passwords safe?

Advertisements and suggestions based on our internet browsing habits are sources of online tracking. However, autocomplete passwords are also another source. This sneaky tactic comes with serious security risks. Here’s how you can stop it from targeting you.

Think your password is secure? Think again

A password policy designed for federal agencies must be secure, right? Surprisingly, that isn’t the case, according to the National Institute of Standards and Technology (NIST). The NIST created many of the password best practices you probably loathe — the combination of letters, numbers, and special characters — but it now says those guidelines were misguided […]

Not all hackers are cybercriminals

Newspapers and Hollywood have shaped our idea of computer hackers, but in the real world it’s not so simple. Some hackers are actually good guys, doing good work in the field of cybersecurity. Take a few minutes to learn more about white, black, and gray hat hackers.

The lowdown on cloud security

If you’re thinking of transitioning to the cloud, consider the security of the platform. While most providers would like you to believe that the friendly, fluffy cloud image used to market the service means it is automatically secure, the reality is far different.

Outdated firmware: An overlooked threat

If most of your company’s computers are obsolete, they double or even triple your chances of experiencing a data breach. Having outdated applications, operating systems, and even web browsers is dangerous. Failing to update your firmware could expose your business to major security threats.

Why CRM is important to business

If you want to up your organization’s sales performance the might be worth investing in customer relationship management (CRM). It helps sales departments understand their clients, tailor their marketing efforts, and more. If your business isn’t using CRM yet, here are five reasons why you should.

The perks of being an Office Insider

Office 365 is already packed with the latest productivity features, but for premium perks, opt for the Office Insider program. This gives Office subscribers a heads up on upcoming Microsoft releases and updates before other companies do. Here’s why Office Insider is perfect for business owners.

4 types of hackers that may target SMBs

When it comes to cyberattacks, most business owners get hung up on the technical  details, forgetting another important aspect: motive. Why are hackers attacking people and organizations? And whom are they targeting? By answering these questions, you’ll have a better understanding of which of your business’s resources need the most protection.

Disaster recovery myths you can dismiss

With technology changing so rapidly we see so many businesses clinging to ideas about disaster recovery that no longer apply. What disaster recovery (DR) myths are still widely believed by the masses? Here are three such falsehoods, that need to be put to rest immediately.

Choosing The Right Mouse

If you’re tired of using an uncomfortable mouse or struggling with your laptop’s trackpad, it’s time to buy a new one. But with so many brands and models out there, where would you even start looking? Here are a few tips that will help you decide.