Multi-factor authentication comes to Venmo

Multi-factor authentication comes to Venmo

We all know that it’s important to maintain high security vigilance across whole spectrum of your IT, from changing your email password regularly to locking your work computer when you are away from your desk. But there are few areas where it couldn’t be easier to score an own goal and make life easy for fraudsters than in the realm of financial services.

Better online security with these 3 easy tips

Better online security with these 3 easy tips

Most of us know we should make our passwords more difficult (sorry, folks, “1234” or “qwerty” just doesn’t cut it) and use an up-to-date version of antivirus software. But all too often, we opt for an easy life – use familiar passwords and put upgrades on the back burner.

FaceTime and iMessage just got more secure

FaceTime and iMessage just got more secure

Whether we use them for business or pleasure, we all want the confidence that the online services we use to store files, post life updates or check our email are given adequate security protection to safeguard our information. But since high-profile breaches such as the celebrity photo leaks of 2014, the security of Apple platforms has been in the limelight.

What is Poweliks and why should you care?

What is Poweliks and why should you care?

As far as viruses, worms and other security infections go, there are probably none quite as frustrating as Poweliks. While most threats can wreak havoc on your computer system and cause untold damage to your business as day-to-day processes are interrupted by unstable IT, information leaks and data losses, the majority at least leave a trace of their work that enables them to be detected and ultimately removed.

What to learn from Sony’s security breach

What to learn from Sony’s security breach

The scale of the recent security breaches at Sony, which led to the cancellation of The Interview’s theatrical release, can make the company’s problems seem beyond the realm of the average small business. But the security mishaps that created the circumstances for the hack are as applicable to modest local and regional companies as they are to multimillion dollar corporations.

Spear phishing attack uncovered

Spear phishing attack uncovered

There are so many ways that hackers can gain access to your computers and systems it boggles the mind. One of the more popular tactics employed is the increasingly common spear phishing. In early December 2014, news broke of a new, super savvy, spear phishing campaign that had succeeded in scamming top Wall Street companies and could be a danger to small businesses as well.

Regin – how bad is it?

Regin – how bad is it?

Spend even a small amount of time looking at the various massive malware threats out there and you will find that security experts are usually able to figure out who developed it, the intended targets, and where it is most prevalent. In early November, news broke about a mystery security threat called Regin that has been around for years, but which experts seem to know comparatively little about.

Looking at Net Neutrality

Looking at Net Neutrality

In many western countries we are blessed with a free and open Internet, but in the US there is a battle currently raging over the idea of Net Neutrality. Chances are high that you will have heard this term thrown around by various experts and media outlets.

CryptoWall: a new security threat

CryptoWall: a new security threat

Is your business secure from the latest malware and security threats? The truth of the matter is that there is always a chance that your business and systems can be attacked and breached by a variety of security threats. One of the more common threats of last year was a nasty piece of ransomware called Cryptolocker.

5 Ways to stay safe online

5 Ways to stay safe online

One of the biggest business technology trends of the past half decade or more is the increasing amount of business that is conducted online. These days, many businesses have integrated online solutions into daily operations and have reaped the benefits.