Last month, we discussed all things VPN.
This week, we’re exploring the world of Tor, and how this service compares (and doesn’t) to a VPN.
Last month, we discussed all things VPN.
This week, we’re exploring the world of Tor, and how this service compares (and doesn’t) to a VPN.
With a recent hack compromising cloud password manager service, LastPass, and vulnerabilities discovered within popular iOS/OS X manager, AgileBits’ 1Password, it’s natural to wonder: can I trust them?
And when it comes to storing your passwords, how much risk is too great?
While it’s easy to cry “Duh, any risk at all!”, remember that the use of any app requires a certain level of trust in the developers (yes, even ‘Hay Day’… we’re sorry folks).
Authentication ensures that employees can access their data – and also ensures that they’re the only ones who can. But as we’ve uncovered, many employees don’t create great passwords. Even more worringly (gasp!), they might even use them over and over.
By reducing the common error of weak and re-used passwords, an enterprise password manager can be a great risk management strategy for your business.
If you’ve never heard this term before, we can’t exactly blame you – this particular tech acronym gets precious little media coverage.
We’re talking about Virtual Private Networks.
Whether you already knew what these letters stood for (or really, really didn’t), a VPN is something you should be keeping in your security toolbox.
Smartphones: We can’t live with them … we can’t live without them.
These devices have changed the way we work and communicate, packing all the power of an average laptop into a tiny, handheld digital companion.
But let’s be real: with everything it knows about you, your trusty smartphone can quickly become a security nightmare.
Our apps store everything from cherished memories to personal finances, calendar appointments, contacts, emails… even your exact location – so it doesn’t take much to realise what’s at stake here.
But just like securing your computer, there are also many great ways to keep your mobile phone secure. Let’s take a look at our top 5 picks.