The difference between 4 types of malware

The difference between 4 types of malware

Since many of us out there have been using the internet for decades, it’s likely that most of us have had our systems infected by malware at one point or another. But how many of us actually know what the differences are between malware, viruses, trojans, and other online threats? For those without a clue, here’s a description of four of the most common ones and the security measures you can take to keep your business protected.

Are you ready for selfie security?

Are you ready for selfie security?

A picture is worth a thousand words – and now a selfie may even be worth more. Later this year, MasterCard plans to jump into the facial recognition-based trend of online security with an app that allows users to verify online purchases with a selfie.

Google holds the key to Drive security

Google holds the key to Drive security

Data breaches are all too common and, without adequate protection, every business is at risk of external attack. In fact, it’s never been more important to ensure your organization’s policies and procedures are foolproof, and that you have contingency plans in place should something go wrong.

5 cloud security measures you need to take

5 cloud security measures you need to take

If you’re considering transitioning your business to the cloud, have you considered the security of the platform? While providers would like us to believe that the friendly fluffy cloud image used to market the service means it is automatically secure, the truth is that the reality is far different.

Securing your company’s data

Securing your company’s data

There have been many security breaches to big-name companies over the past few years – eBay, Adobe, Home Depot, and Sony Pictures to name a few. While large enterprises are primary targets for hackers, small and medium-sized businesses are also vulnerable, and therefore need to arm themselves against data security threats.