Undoubtedly, 2018’s first set of truly bad news involves reports about the Spectre and Meltdown bugs, fundamental flaws in computer processors that can leak highly sensitive data. Researchers say they affect a majority of modern computers, and chances are your business’s devices are also affected. Luckily for Mac, iPhone and iPad users, there are ways […]
Have you ever heard of Meltdown? How about Spectre? Do you know what a kernel is? If not, you probably will any day now, as they have to do with one of the most serious computer-security vulnerabilities ever exposed. And since any machine running an Intel processor is affected, just about everyone is at risk.
Mobile phones are just as prone to cyber attacks as desktop PCs, and cyber scammers are relying on unsecured devices to carry out their deeds. If you haven’t implemented a cyber security guideline for your company’s mobile devices, you can start by following these easy steps. Set a strong password Whether your device requires a […]
When you visit an encrypted website, the connection between the source of the web page and your browser is secure. Encryption ensures users’ browsing habits are safe from hackers’ prying eyes, but phishing scammers have found a way to adopt it for their own schemes. How hackers use encryption to carry out phishing scams According […]
You might be entering credit card details on a website to purchase something online or filling in your personal information to subscribe to a service, thinking you’re safe behind the keyboard. And you probably are — if the computer you’re using doesn’t have a keylogger installed. But for HP laptop users, chances are they aren’t […]
First things first: If you are a contractor or subcontractor under the employ of the US Department of Defense, you will be required to comply with something called DFARS.
DFARS is the Defense Federal Acquisition Regulation Supplement, and it contains a new clause that takes effect in 2017. It stipulates that every organization handling, storing, processing, or transmitting Department of Defense (DoD) data must meet certain conditions pertaining to the safekeeping and dissemination of that data.
Security breaches are becoming an all-too-common occurrence in the healthcare industry. Due to a sever lack of competent security measures to protect extremely vital patient records, healthcare organizations have become a prime target for hackers and malicious insiders alike. Read on to find out some surprising statistics as exposed by healthcare data privacy company, Protenus’ […]
Almost every macOS update comes with a security patch that users often dismiss. If you’ve read about KRACK, then you should know that updating your Mac’s operating system to macOS 10.13.1 High Sierra is extremely important. Here’s everything you need to know about Apple’s latest Mac OS. Why you should update now Foremost on Apple’s […]
To make certain concepts easier to understand and to undertake, one could break them down to lists of fundamentals. It works in any discipline, too: The three fundamentals of defensive driving; The four fundamentals of grilling beef; The five fundamentals of meditation.
In the world of cybersecurity, there’s no time to rest. Hackers are constantly developing malware, and reusing attacks that were successful in the past. Recently, hackers have revived the Locky ransomware, and it has already infected thousands of computers worldwide. If you want to keep your healthcare practice safe, read on. Using old tricks The […]