Practical tips to secure your email account

Email is one of the most commonly used forms of communication nowadays. It’s quick, easy, and convenient, but it’s also vulnerable to attacks from hackers. Read on for some practical tips that you can use to secure your email account and keep your information safe. Use strong passwords Many email users fail to realize how […]

Working remotely? Follow these cybersecurity tips

Working from home is becoming an increasingly popular option for employees around the world. While this flexible work arrangement can be a great perk for employees, it also comes with its own set of security risks. Follow these cybersecurity tips so you can protect yourself, your personal information, and your company’s data while telecommuting. Patch […]

Why two-factor and two-step authentication matter

Two-factor authentication and two-step authentication are both vital for data security. But what’s the difference between them? Is one authentication process better than the other for your business? In this blog post, we will break down the differences between two-factor authentication and two-step authentication to help you decide which is more suitable for your needs. […]

How to keep your email account safe

Many businesses use email to send and receive sensitive information, making it an attractive target for cyberattacks. To reduce your exposure to cyberthreats, implement the following email security measures. Use separate email accounts Most people use a single email account for all their online tasks. As a result, all information from websites, newsletters, shopping deals, […]

Cybersecurity Awareness Month: Creating Secure Passwords

Strong passwords or passphrases are critical to ensure the safety of all online account log-ins.  In the spirit of Cybersecurity Awareness Month, here are some tips to ensure your passwords pass the test:

They should be at least 8 characters long
Composed of three of these character classes:

Lower-case letters: (abcde . . . . )
Upper-case letters (ABCDE . . . .)
Numbers (123456 . . . )
Non-alphanumerics (?><{:")*&^ . . . .)

Passwords should be unique for every log-in.

It’s time to rethink your password strategy

In 2003, the National Institute of Standards and Technology (NIST) stated that strong passwords should consist of upper- and lowercase letters, numbers, and symbols. However, the institute has now reversed its stance. Find out why and learn what their new recommendations are. The problem The issue isn’t that the NIST advised people to create easy-to-crack […]

BYOD tips to improve security

Lax bring your own device (BYOD) policies are a growing concern for businesses. If you’re not managing your organization’s BYOD policy properly, it can pose a host of security risks to your company. Below are some of the inherent security risks of BYOD. Loss or theft of devices – Employees often bring their personal devices […]

Tips to keep your business data safe

Losing or compromising data can be disastrous for your business. It can lead to reputational damage, costly lawsuits, and termination of contracts, among others. And because threats to data security are always present online, it’s important to implement tough security measures that will keep your business data safe 24/7. Here are some tried-and-tested methods to […]

How to create a strong passphrase

It’s not controversial to state that good, secure passwords are hard to create and even harder to remember.

And there are few things more frustrating than having to create a new password because you forgot the old one or were forced to change it.

In our attempt to make passwords easier to remember, we start adopting bad password habits.

Two-step and two-factor authentication: What’s the difference?

Every business should have a strong cybersecurity posture to keep cybercriminals from infiltrating their network. One way to do this is by implementing a strict authentication process using two-step or two-factor authentication. These two processes are so similar that many confuse one with the other. Learn the difference between the two and how you can […]

Many businesses don’t prioritize disaster recovery. Improve your disaster preparedness with our FREE eBook.Learn more here
+