Tag Search: security
Posted on Wednesday March 07, 2018 | web browsing, security, phishing, https everywhere, https, http, firefox, encryption, chrome
Very few internet users understand the meaning of the padlock icon in their web browser's address bar. It represents HTTPS, a security feature that authenticates websites and protects the information users submit to them. Let's go over some user-friendly HTTPS best practices to help you surf the web safely.
Posted on Tuesday March 06, 2018 | smartphone, security, requirements, mobile device, hardware, google, android
From Samsung to Huawei to HTC, there are plenty of Android smartphones available to consumers and businesses. But the choices get even more confusing as smartphone manufacturers release new models every year. That's why Google compiled a list of devices to help you choose.
Posted on Monday March 05, 2018 | spectre, server, security, patches, meltdown, healthcare, data storage, data breach
Data security is critical to the healthcare industry. Hospitals and clinics need to ensure medical records are protected at all times to stay HIPAA-compliant. But with Spectre and Meltdown affecting every server, all healthcare providers are at risk of data breach.
Posted on Tuesday February 27, 2018 | windows 10, virtualization, software, security, pro, operating system, home, 10 s
When buying new hardware, you have to choose which operating system (OS) to install. And if you go with Windows, you'll have to make even more decisions, as there're Windows 10 Home, Pro, and 10 S. Although they contain many similar features, there are significant differences between them. Here's a quick rundown of each OS version.
Posted on Monday February 26, 2018 | windows, web, security, scam, malware, mac, google, cyberthreat, chrome, browser
With evolving technology comes evolving threats. Recently, a researcher revealed that a new type of scam freezes Google Chrome and tricks users into believing that their network security has been compromised. Little did they know that following instructions listed on the screen will lead to an actual security breach.
Posted on Friday February 23, 2018 | server, security, privacy, password, mac, firmware, firewall, encryption, apple
Mac users follow certain steps to maintain privacy and protect company data. But if you're too busy or short on resources, you might place security lower on your to-do list. Whatever your reason, the threat is real and you need to take steps to protect yourself.
Page: 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647