The Year Ahead: Security Predictions for 2018

• in categories: advice • by: Michelle Balestrat

With a new year comes new security threats, as well as some carryovers from last year. If you’ve just decided to get your security on track – or you’re wondering what to focus on this year, it can be difficult to figure out your biggest threats.

A pocket calendar laying on its side.

Beyond security basics and accounting for human error, it’s important to stay ahead of time-sensitive security issues like software vulnerabilities, certain malware outbreaks and changes to Internet-relevant laws.

Read on to see our list of the topics most likely to make waves in security this year.

Read More

Spotting Holiday Scams

• in categories: advice • by: Michelle Balestrat

As December rolls on, finishing our gift shopping becomes more urgent and can cause us to spend much more than we’d prefer.

(Image) A stack of three gifts, topped with a large bow, in front of a white background.

Unfortunately, it’s this very urgency that scammers love to take advantage of every year. Here’s how to see through the rush and spot these common holiday scams.

Read More

Think Before You Click: Bundled Software

• in categories: advice • by: Michelle Balestrat

Bundled software: it’s the number one regret for those of us with impatient clicking habits. Far too often, it seems that the free software we actually want is hidden behind a minefield of potentially treacherous mouse clicks.

A cascade of blank file explorer windows above a blue background.

How do you keep yourself free from junk software while downloading your favourite free utilities? Lucky for you, we’ve compiled a guide to help you navigate these often-fraught situations.

Read More

Our Top Email Security Tips

• in categories: advice • by: Michelle Balestrat

Securing your email communications is a multi-layered process that involves using multiple levels of security. No wonder many people simply don’t bother securing their email fully!

(Image): Close up of a phone, showing unread email icons.

It’s a shame, since your email is often the crucial security safeguard for all your online accounts. Read on to learn exactly how to get your email security up to par.

Read More

Torrent Clients: Where's the Harm?

• in categories: advice • by: Michelle Balestrat

Torrent and peer-to-peer software has been hugely popular since it burst into the public eye in the early 2000’s. Since then, clients like BitTorrent and UTorrent can be found on millions of computers around the world.

(Image) A gushing torrent of water rushes over rocks.

However, this is one case where there really isn’t safety in numbers. Torrent and peer to peer file sharing clients are in a class of software called riskware, a grey-area between legitimate software and potentially unwanted or harmful malware.

Read More

Boost your breach protection!

Email Watchdog

Guard your online accounts.
  • 10 and 50 email packs available.
  • Detailed breach notifications.
  • Watchdog Update email newsletter.
  • Priority email support.
Learn More

Business Watchdog

Protect your company’s accounts.
  • Protect all email addresses in your domain.
  • Detailed breach notifications.
  • Exclusive access to your domain’s breach status.
  • Watchdog Update email newsletter.
  • Priority Email Support.
Learn More
Previous Page 1 of 20