Laptops today boast ridiculously powerful batteries, a far-cry from the roughly 2-3 hours we used to get. Most Apple laptops nowadays can easily provide up to 12 hours of batter life. So, if you’re laptop battery doesn’t seem to getRead More
Blog
Home security: Why you should put IoT devices on a guest wi-fi network
The number of internet-connected devices in homes has been growing exponentially over the last decade. Atypical home now has more than 10 devices connected to the internet. IoT stands for Internet of Things, and it basically means any other typeRead More
Smishing what?
Smishing is the latest form of phishing Smishing is a form of phishing that uses text messages (as opposed to emails) to trick unknowing recipientsinto clicking a malicious link or otherwise “mining” personal information through their replies. They became aRead More
Phishing scams still a threat?
The shorthand answer is yes. Scammers evolve their methods as technology progresses, employing AI-based tactics to make targeted phishing more efficient. If phishing didn’t continue returning benefits, then scammers would move on to another type ofattack. But that hasn’t beenRead More
How often should employees be trained on cybersecurity practices?
You’ve just completed your annual phishing training where you teach employees how to spot phishing emails. You’re feeling good about it, until about 5-6 months later when your company suffers a costly ransomware infection because someone clicked on a phishingRead More
The best approach to multi-factor authentication
What’s the most convenient? Credential theft is now at an all-time high and is responsible for more data breaches than any other type of attack. With data and business processes now largely cloud-based, a user’s password is the quickest andRead More