Category: Security
Aug 15, 2016
Bring Your Own Encryption Keys to Amazon Web Services
If you really want to protect your data AND use cloud services, you need to control your own encryption keys
Read MoreAug 11, 2016
Apple: Overpriced Products – Cheap on Bounty Payments
If you have ever purchased an Apple product, you know that they cost a lot of money. They are beautifully
Read MoreAug 09, 2016
Beware of Walmart Phishing Scam
BGR reported that there has been an uptick in phishing e-mails appearing to come from Walmart. The e-mail message requests
Read MoreAug 08, 2016
A New Anti-Ransomware Portal Launches
Ransomware is a huge problem. It seems that we hear of more infections despite all the training and news of
Read MoreAug 02, 2016
Flaws Found in Many Security Products
We all trust our security products to protect our environment from attacks. The flaws are not just limited to AVG,
Read MoreJul 28, 2016
LastPass Bug Reveals Passwords
Everybody should be using a password manager. I just had a post the other day talking about Dashlane and a
Read MoreJul 27, 2016
The Death of SMS-Based Two Factor Authentication
You should be using two factor authentication (2FA) wherever you can. For those less technically inclined, 2FA uses a second
Read MoreJul 26, 2016
Dashlane Enterprise Password Manager for Mobile Devices
I'll say it again. It is now time for everybody to have access to a password manager. In case you've
Read MoreJul 14, 2016
Microsoft’s Patch Tuesday Fixes 47 Vulnerabilities
It's that time of month again. Recent updates from Microsoft fixes critical vulnerabilities in Windows, Edge, IE, Office and the
Read MoreJul 13, 2016
HTTPS is Good – Not a Magic Bullet
Most users of the Internet know that a URL with HTTPS means the site is secure. Many advocates even say
Read MoreJul 12, 2016
Calling All Crazies: Pokeman Go Will Change Your Life
Unless you've been living under a rock this past week, odds are that you are deeply involved or know someone
Read MoreJul 06, 2016
Largest Increase of Enterprise Encryption Deployment in Eleven Years
Every year the Ponemon Institute reports on the global trends and regional differences for encryption. The survey interviews IT professionals
Read More