Google Docs... For Your Passwords?

• in categories: advice • by: Michelle Balestrat

Google Drive and Docs are a great way to share work amongst teams and across devices. It even provides a free alternative to the Microsoft Office suite, for those so-inclined.

Google Docs Logo.

These days, it appears that some of us are taking it a step further: using Google Docs as an alternative to a password manager.

While this isn’t exactly Security Best Practice, it can be a DIY solution to storing passwords when there’s nothing better at hand. Here’s how to use Google Docs as a makeshift password storage system.

Read More

Riskware: What's the Risk?

• in categories: advice • by: Michelle Balestrat

Malware comes in many different flavours – none of which you’re going to want on your machine.

However, there’s another type of potential threat. Riskware describes software that’s, well, risky. Much of it is also highly useful, and depending on your needs, uninstalling it might not be an option.

(Image) A safety sign warning about a slip hazard.

While all completely legitimate, the riskware category includes programs that can present a potential threat: their functions can be used for good as well as malicious purposes.

What sort of programs fall under the Riskware label?

Read More

Fighting the Phonies: Rogue AntiVirus and Fake Tech Support

• in categories: advice • by: Michelle Balestrat

It’s a fact of life: scams are rife in the tech world, particularly on the consumer side.

An office phone.
Image credit: Karolina Krabat via Flickr (see footnote).

While almost anything from shopping to gaming can turn out to be less-than-legit online, it’s particularly worrying when security-related software and services can’t always be trusted, either.

When it comes to staying safe on the Internet, remember that healthy skepticism is your one big advantage.

Read More

How Can You Tell if a Website is Secure?

• in categories: advice • by: Michelle Balestrat

With the ever-increasing amount of fraud online, the pages you visit might not always be as they seem. More than ever, identifying whether or not you’re connected securely to a website has become an essential skill.

A combination lock guards a wooden door.

Thankfully, there’s really not much to it. Once you know what to look for, your trained eye can save you (and your wallet) from a world of hurt.

Here’s our guide to sussing out website security like a pro.

Read More

Security and the Internet of Things

• in categories: advice, news • by: Michelle Balestrat

Every time you get in a car, you’re putting your life in your own hands.

A 2014 Jeep Cherokee.
A 2014 Jeep Cherokee, the model used in WIRED Magazine's security experiment.

But how about putting it in the hands of the Internet?

The latest Jeep hack shows that the popularity of Internet-enabled devices now extends to our roads, and it’s not all modern convenience.

Read More

Boost your breach protection!

Email Watchdog

Guard your online accounts.
  • 10 and 50 email packs available.
  • Detailed breach notifications.
  • Watchdog Update email newsletter.
  • Priority email support.
Learn More

Business Watchdog

Protect your company’s accounts.
  • Protect all email addresses in your domain.
  • Detailed breach notifications.
  • Exclusive access to your domain’s breach status.
  • Watchdog Update email newsletter.
  • Priority Email Support.
Learn More
Page 12 of 22