The Facebook data breach scandal explained

Thanks to social media, businesses can stay in close contact with their customers and while also attracting new ones. But what happens when one of these platforms doesn’t guard the information you’ve given it? How does this affect its users? Last month, news broke that a firm known as Cambridge Analytica collected private data from over 50 million Facebook users. The British company supposedly used this information in 2016 to influence voter behavior during the US presidential election and UK’s Brexit campaign. How did they harvest the data? In 2015, a Facebook personality quiz app called “This is Your Digital…

Read more

The importance of strong iPhone passcodes

Now is the right time to shift to a stronger passcode for iPhone users, with police departments, federal agencies, and possible criminals, lining up to buy technology that can bypass your phone’s security. Experts say technology for unlocking iPhones is very much in circulation, so here’s everything you need to know. The problem According to reports, at least two companies, Israel-based technology vendor Cellebrite and Atlanta-based Grayshift, have both developed relatively inexpensive technology for unlocking iPhones. Reportedly, local and regional U.S. police departments as well as the federal government have been purchasing the technologies. Grayshift’s GrayKey box is a de-encrypting…

Read more

Chrome, Edge, Firefox to Support Biometrics

Google Chrome, Microsoft Edge, and Mozilla Firefox will soon support web-based biometric authentication. The leading internet browsers are expected to allow users to sign into online profiles through fingerprint scanners, voice authentication, facial recognition, and the like. Online biometric authentication through these browsers requires no additional software. Authenticate Your Profile on Your Mobile Device Chrome OS, Windows, and MacOS, Linux, and Android are all adding features to help users safely log in using biometric identification via USB, Bluetooth, and NFC devices connected to smartphones and tablets. With such convenience, users can verify their accounts on the go. Preventing Cyber Attacks…

Read more

Tips for optimizing your mobile hotspot

Did you know you can keep your laptop connected to the Internet in areas without a Wi-Fi connection? All it takes is a portable, low-cost 4G router to make a private wireless network for their devices. These tiny devices are a great investment for employees working from the road, and we’ve got some tips on how to use them. A mobile hotspot usually provides faster Internet connection and better security compared with public Wi-Fi. But if this kind of mobile networking is not utilized well, it will accumulate expensive data charges. The following tricks will maximize the efficiency of mobile…

Read more

Mobile devices in the field

Field workers. You see them every day. And you notice that they, too, use mobile devices, as now more than ever do they need to stay connected with their organizations to stay in business. This is where mobile performance management, a critical factor for any field worker to perform and finish tasks on time, comes in. Here’s how to ensure connectivity for these workers. The ability to manage the workforce out in the field requires a modern support infrastructure called mobile performance management. It includes the top five tips to keep field workers connected: optimizing traffic, applying control, measuring performance…

Read more

Android phones miss vital security patches

Android manufacturers routinely update their products with the latest security patches to keep users safe from all manner of threats. Or so they would have you believe. According to recent reports, Android phone manufacturers may have accidentally missed a few critical patches. Here’s everything you need to know. Missed patches Every month, Google rolls out a new batch of Android bug fixes and critical security updates. These patches are available to Google Pixel phones almost immediately, but many third-party manufacturers are often months behind. When it does arrive, you should theoretically be protected from every recently discovered threat. After extensively…

Read more

The management drawbacks of virtualization

IT managers turn to virtualization to effectively scale down on cost, boost efficiency, and maximize space in their server rooms. Yet, what they didn’t expect were the drawbacks involved in this technology solution. It’s therefore essential that you’re aware of the following management issues before going all in: Backup Incorporating a robust backup system in a virtualized setting can become a huge challenge. You’d have to determine which data you want to store and how often it should be backed up. You would then have to decide whether you should back up all your virtual machines or just some vital…

Read more

Office 365: New security updates

Microsoft recently rolled out security updates to Office 365 for business and home users. These enhancements aim to increase safety when sending or receiving an email in Outlook, sharing links in OneDrive, and alerting users of possible malware infection. Files Restore in OneDrive Previously available only to Office 365 business users, Files Restore allows users to conveniently recover files in OneDrive within the last 30 days. Home and personal users can now easily retrieve and restore all their files at a specific point in time, which is useful in instances where files are accidentally deleted, corrupted, or compromised by ransomware…

Read more

Beware of watering hole attacks!

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack. What are watering hole attacks? Much like phishing, a watering hole attack is used to distribute malware onto victims’ computers. Cybercriminals infect popular websites with malware. If anyone visits the site, their computers will automatically be loaded with malware. The malware used in these attacks usually collects the target’s personal information and sends…

Read more

How to enjoy real cloud cost-savings

If you want to increase collaboration, productivity, and security all while keeping costs down, the cloud is the perfect solution. But if you’re not careful, hidden charges can creep up on your monthly bill, preventing you from truly reaping the benefits of the cloud. Fortunately, there are some things you can do to bring these costs down. Don’t go for standalone services Standalone services are the biggest price trap in the cloud. Spending on a standalone cloud software may seem harmless now, but if you decide to purchase similar services, the costs can quickly pile up. Then, there’s the issue…

Read more


Important
This site makes use of cookies which may contain tracking information about visitors. By continuing to browse this site you agree to our use of cookies.