Do I Need a Guest WiFi?

Every store, doctor’s office, fitness center, and establishment from here to Timbuktu seems to have a guest WiFi network. Should your business have one as well? Take this quiz to find out: Now that you know if you should or shouldn’t think about a guest WiFi, here are some helpful bits of information you’ll want […]

Read the full article

Lessons from Apple & San Bernardino

The news currently is inundated with information about the San Bernardino shooting in December of 2015. While this tragic event occurred months ago, meaning it would normally be out of the newsroom at this point, this case has resurfaced because of cybersecurity. While the FBI continues their investigation into this case, they are asking Apple […]

Read the full article

Does the Internet Need an Age Requirement?

Last month, The Verge posted an article about Europe’s talks of changing the age of Internet consent to 16, up three years from the current age of consent. In many ways, this shift can be seen as a good thing or a bad thing. On the one hand, this has the potential to protect youths […]

Read the full article

Cybersecurity in Healthcare

It’s no secret that as technology innovates, it is adopted by different sectors of industry and adapted to best meet its needs. Updated technology comes its own set of risks, though, so hearing of the several cybersecurity breaches that have occurred in the medical field recently is less than surprising. No one wants to have […]

Read the full article

Cyber Monday Security Tips

Now that Thanksgiving has passed, the holiday season is officially in full swing! Whether you have a religious holiday coming up or just want in on some bargains, odds are, you’ll be looking at the Cyber Monday sales. This year is a bit different than previous years, though, and that’s because of the insane amounts of […]

Read the full article

Why You Want Two-Factor Authentication

If you have been recently following the cybersecurity trend on news sources and tech websites, you likely have heard the phrase “two-factor authentication.” This method of double-checking your identity before granting access to an account or webpage is becoming more and more commonly used in the cyber community. According to TechTarget, two-factor authentication is ” security […]

Read the full article

What to Ask IT Before Choosing BYOD

BYOD (bring your own device) is great. There is something great about having access to your work information anywhere you are. If a coworker calls you while you’re out with questions, all of your emails and files can be right at your fingertips. Especially if you’re in a position where you are out of the […]

Read the full article

Apple Makes You the Apple of Marketers’ Eyes: How Apple Ads Can Be a Security Threat

On Thursday, it was announced that Apple has a patent application filed that would allow iAd, Apple’s advertising branch, to target advertisements to you based on your credit card limits and projected income. In short, if Apple does not believe you could pay for the item, Apple ads won’t show it to you. The wording used […]

Read the full article

Malicious Flashlight App? The Surprising Truth

Have you downloaded a flashlight app? According to this video, it could be secretly malicious, stealing information from your phone. Watch the video below:   Gary Miliefsky is the CEO of SnoopWall, a company centered around cybersecurity. According to this news segment, flashlight apps downloaded from your mobile device’s app store may be snooping into […]

Read the full article

Saving Your Searches: What Recent Google Features Mean For Your Security

This week, Google made it possible for its users to download their search histories. By signing in and accepting the terms and conditions, Google emails you a .zip file with all of your past searches and the date and time it was searched. It sounds cool, but is it worth your risk? First, why has […]

Read the full article
Top