Many tech companies are creating easier-to-use alternatives to traditional username and passwords. Apple’s “Face ID” which uses biometric authentication to unlock your phone is probably the most widely used of these innovations at present. Biometric authentication is a security process that verifies your identity based on your unique biological characteristics. Here are some examples of biometric authentication that could increasingly replace passwords in the coming years. Voice Identification: Vocal recognition technologies measure […]
!F Y0u C4n R34d Th1s, 1t C4n B3 H4ck3d Leetspeak is a system of modified spellings used primarily on the Internet. It often uses character replacements in ways that play on the similarity of letters via reflection or other resemblance. It’s commonly used to create passwords that are considered memorable and secure. Unfortunately it didn’t take […]
Phishing emails have gone well past those general “Nigerian Prince” messages addressed “To whom it may concern.” Today, they’re much more personal and will include information that you think a scammer shouldn’t know.
When you start talking about network technology that connects multiple sites, it’s easy to get in the weeds with terms like shared nodes and IP subnets. But each of these components plays a part in how solid and secure your internet connections are between offices, cloud apps, and other sites.
Employee cybersecurity awareness remains one of the vital layers in an overall IT security plan for a business. We always recommend ongoing training rather than a “one and done” approach, because the threat landscape is always evolving. Phishing is still the main delivery method for malware and credential theft attacks, but the method […]