How to Secure Your Gaming PC

• in categories: advice • by: Michelle Balestrat

You’ve splashed out on a gaming powerhouse, capable of rendering the latest titles in Ultra. You’ve also got hundreds – even thousands – of dollars and hours invested in your Steam or Origin account.

(Image) A gaming motherboard lit up in blue light.

Sound like you? Congratulations, you’re one of the most sought-after targets for hackers. Online gaming accounts now hold a wealth of personal information, including credit card details and other identifying information.

Read More

Data Breach Notification Laws: Helping Those Most At Risk?

• in categories: advice, news • by: Michael McKinnon (Guest Blogger, CISSP, Sense of Security)

Having private data leaked publicly is annoying when all you need do is change a password, but for some it can be far more serious.

(Image) The pillars of a courthouse.

With Australia, the latest country to add Data Breach Notification laws, we look at the effectiveness of such measures for people at risk of serious harm.

Read More

Tech Support: Your New Best Friend

• in categories: advice • by: Michelle Balestrat

Whether you’re a home user, small business owner, or even working for a company with its very own IT support department, we all need a little help sometimes.

(Image) A cartoon line-drawing of a tech support worker on the phone with a customer. Text reads: Well, it pops out of the box when I push the button.

Knowing how to get on the good side of IT support is a critical skill that can bring many happy returns, and allow you to smoothly recover from technical issues large and small.

Here are our top tips for fostering a good relationship with any IT support staff you might need to reach out to.

Read More

Is Your VPN App Compromising Your Security?

• in categories: news • by: Michelle Balestrat

VPNs: they’re great, and you should have one in your toolbox!. VPN apps for your smartphone can be a great way to maintain your privacy when using your phone on public networks, and offer a host of other benefits.

(Image) A hand hovers over an array of screens, each showing many app icons.

However, new research from the CSIRO, in conjunction with the University of New South Wales and UC Berkeley has found that 38% of 283 VPN apps surveyed for Android (commonly found on the Google Play Store) were found to inject malware and malvertising into their services.

Read More

How To Respond To A Ransomware Infection

• in categories: advice • by: Michelle Balestrat

It’s something from our worst nightmares: you log into your machine and you’re greeted by a locked screen and a threatening message.

Try as you might, you’re unable to get access to your computer or files: you’ve really done it this time. You’ve just been hit by ransomware.

(Image)A bright glowing sign reading Emergency Exit.

However, many users seem blissfully unaware of the threat, and more importantly – what to do when it hits. Debate rages in security circles over the right course of action to take: do you pay up to get your data back, or ignore the demands?

Read More

Boost your breach protection!

Email Watchdog

Guard your online accounts.
  • 10 and 50 email packs available.
  • Detailed breach notifications.
  • Watchdog Update email newsletter.
  • Priority email support.
Learn More

Business Watchdog

Protect your company’s accounts.
  • Protect all email addresses in your domain.
  • Detailed breach notifications.
  • Exclusive access to your domain’s breach status.
  • Watchdog Update email newsletter.
  • Priority Email Support.
Learn More
Previous Page 1 of 18