In March of 2020, work as we knew it instantly changed. We were used to an office environment where physical office space was the norm. Virtual meetings were the exception and were primarily used when clients were distant and travel was impossible. Although more and more companies had made working virtually more acceptable, the trend was merely beginning. The global pandemic of COVID-19 changed all of this. Many will look back on this year and remember it as a disaster. However, because of the challenging world pandemic, technology quickly evolved and was adopted faster than would have ever happened.
on Monday, 28 December 2020 Posted in
Business,
Security,
mobile security,
Technology,
Blog
Read more
The question is not whether you should have multifactor authentication (MFA); instead, what type? MFA is utterly essential when it comes to your business and personal data security. In the world of multifactor authentication, not all avenues are created equal. Although having something is better than nothing, in this case, that is not the attitude that you should have concerning your security. In 2016, NIST (National Institute of Standards and Technology) proposed restricting the use of SMS or voice for MFA, and although they softened their approach, they still do not recommend this method of MFA. Microsoft recently began campaigning against using SMS or voice for MFA. Today we are going to look at why the big push and what avenue is best for MFA.
on Tuesday, 08 December 2020 Posted in
Data Security,
Online Security,
IT Support,
Business Tips,
Security,
Data,
mobile security,
Technology
Read more
In regards to Multifactor Authentication, the question should not be if but instead what kind. Multifactor authentication (MFA) is vital to the security of your network. As Brian Sherman from Valeo was quoted, “Weaker MFA is better than no MFA.” However, if you can protect your data more thoroughly, then why wouldn’t you? Let’s take a look at the forms of MFA and how they will help keep your data safe.
on Tuesday, 17 November 2020 Posted in
Cybersecurity,
Data Security,
Online Security,
Business,
Security,
Data,
IT Solutions,
mobile security,
Blog
Read more
Yubikey by Yubiko was a hit at last week’s CES 2019. Fans of this multifactor authentication device were already singing its praises, but these praises multiplied when Yubiko announced it now is compatible with iPhones and will be available soon to all users. Yubiko is a relatively new company so many have not heard the incredible reputation it is developing in the world of data security so if you are one of these individuals, dial in now and continue reading! Large corporations like Google and Facebook, who have extreme needs to secure data are already on board with Yubiko and have seen great success with their security needs.
on Wednesday, 16 January 2019 Posted in
Data Security,
Online Security,
The Internet,
Business Tips,
Security,
IT Solutions,
mobile security,
Productivity Tips
Read more
As of last week, Apple had released massive changes to their operating system. This update is one of logic and usefulness unlike many updates in the past that were not always helpful but leaned more on the sparkly side. This round appears to be very well thought out and baked. The changes, in fact, have not only been suitable for the new devices but also seem to be great improvements to the older technology as well.
on Tuesday, 25 September 2018 Posted in
Wearable Technology,
mobile security,
Technology,
Productivity Tips
Read more
What are they and how do they work?
Security is a top priority in business. Everywhere you turn someone’s data is being compromised. One of the highest recommended tips for security is to use a password manager, and luckily, it is one of the simplest methods as well. Although it is easy, many still hesitate as they do not fully understand what it is and where the passwords are being stored. Let’s take a high-level look at what password managers are and how they work.
on Wednesday, 05 September 2018 Posted in
Data Security,
Online Security,
Business Tips,
Security,
mobile security
Read more
Keylogging. Is it a new concept or just an updated version of Espionage?
Information and specifically confidential data have always had a price, and someone has always wanted to get a hold of it. Documented spies date back in history from the 1st century. Espionage continues to evolve, and we as users of technology must stay on top of how our data is being hacked. Keylogging is one of today’s modern cyber-crimes but has the same basis as ancient spies.
on Wednesday, 22 August 2018 Posted in
Cybersecurity,
Data Security,
Online Security,
IT Support,
Business Tips,
Security,
mobile security
Read more