Tip of the Week: Is Browser-Based Password Management Safe to Use?

Tip of the Week: Is Browser-Based Password Management Safe to Use?

Passwords are quite literally everywhere nowadays. With so much of modern life now controlled or held within user accounts, keeping your passwords both secure and straight in your head is crucial. Many web browsers now offer some built-in password management utility to help make this process more convenient for the user, but is this option available at the cost of security?

Physical Security Tools Every Business Can Use

Physical Security Tools Every Business Can Use

Many small and medium-sized businesses don’t consider making physical security investments if they already have some type of workable solution in place. The problem is that there have been a lot of innovative moves made that would make those investments strategically smart at the time. So, while a physical security upgrade may not be a priority for your business, we thought we’d go through some of the tools used, and how they have improved. 

How Big of a Threat is the Dark Web Gig Economy?

How Big of a Threat is the Dark Web Gig Economy?

Contemporary movies are filled with high-stakes cybercrime, where a lovable criminal syndicate breaks into a company’s systems to help wreak havoc on the true villains of the film, all the while exposing the company’s dirty laundry. Naturally, this idea can be frightening for any business, whether or not they have any dirty laundry to air out—after all, nobody wants a ruined reputation—and is unfortunately less and less of a fantasy all the time.

Don’t Let a Malicious Application Undermine Your Mobile Security

Don’t Let a Malicious Application Undermine Your Mobile Security

While you’ll probably hear us recommend that you update as soon as possible at every opportunity, the source of these updates is important to consider. This is especially the case now that mobile security firm Zimperium has discovered a new mobile spyware that pretends to update your mobile device… but actually steals data and monitors the user’s search history and location.

Are Utilities as Secure as They Should Be?

Are Utilities as Secure as They Should Be?

Recently, a story broke in Florida that sounds like something out of a terse action film: a hacker managed to access a water treatment facility and subjected the Pinellas County water supply with increased levels of sodium hydroxide. While onsite operators were able to correct the issue right away and keep the public safe from danger, this event is the latest in a line of cyberattacks directed at public utilities. Let’s consider this unpleasant trend.

Checking a Website’s Safety from Its Google Result

Checking a Website's Safety from Its Google Result

Google search is synonymous with searching the internet, but that hasn’t stopped them from constantly innovating the service. One of the most recent updates is to give users more context for the content that returns on search results. This works to protect users from potentially clicking on websites that could contain threats. Today, we discuss this innovation and how it will look to the end-user.

How Blockchain is Changing Health Technology

How Blockchain is Changing Health Technology

You’d think that the healthcare industry would be at the very cutting-edge when it comes to information technology implementation. That isn’t always the case. One technology that developers are really looking to take advantage of in the healthcare space is blockchain. The technology behind cryptocurrency is being used to help patients better control their care. Let’s take a brief look now.