Enhanced sign-in security for Venmo

Enhanced sign-in security for Venmo

With the threat of sophisticated intrusion on the rise, there has never been a more important time to be vigilant about IT security. Whether it’s selecting a difficult-to-guess password and then changing it frequently, or remembering to properly log out of social networking sites when using a shared computer, there are plenty of simple steps we can all take to better protect ourselves online.

Easy tips for better internet security

Easy tips for better internet security

With over 3 billion internet users around the globe totaling roughly 40 percent of the population, the internet is rife with opportunities for hackers to steal your information. And with technology constantly evolving and the internet growing, it’s not likely to get safer anytime soon.

How Apple made FaceTime and iMessage safer

How Apple made FaceTime and iMessage safer

We have become acclimatized to ever-present threats to the security of the information and files we share and store online. But we all still want our data to be as secure as possible and, following high-profile breaches such as the celebrity photo leaks of 2014, if anything the issue of online security is even more prominent in our minds.

Why you need to know about the Poweliks threat

Why you need to know about the Poweliks threat

Most of us have suffered the horrors of a computer virus at some point, and we know the damage that can be caused by these security infections. Our work gets disrupted as IT systems go down and, if we’re really unlucky, sensitive and valuable data might be lost or even leaked.

3 IT security take-aways from the Sony hack

3 IT security take-aways from the Sony hack

Any business can become the victim of security breaches on a mass scale, as shown by the debacle which recently eclipsed Sony and forced it to temporarily cancel the release of blockbuster movie The Interview. Beneath the dramatic headlines are lessons for small business owners everywhere in how simple errors in IT security management can have grave consequences.