What Happened to Our Facebook Page?

What Happened to Our Facebook Page?

Years ago, we didn’t have a Facebook page. In 2017, we started an experiment. Basically, we wanted to research the traffic type and influence that Facebook had on our business. As a security driven company, this was risky. The goal was simple: see if, within 12...
Smishing: It’s Phishing for Your Phone.

Smishing: It’s Phishing for Your Phone.

Next time you get an SMS, you might want to think twice before clicking a link in it. SMS-based phishing has been on the uptick. It’s email brethren often hits your spam filter but who’s filtering your text messages? Smishing often takes the form of an...
Boost Your iPhone®’s Privacy

Boost Your iPhone®’s Privacy

The fine folks at the DuckDuckGo Twitter account posted a great guide to iPhone security practices. The infographic covers basic common sense steps you can take to protect your privacy, along with some tips for more advanced and pro active security. DuckDuckGo is the...
A Beginner’s Guide to Malware

A Beginner’s Guide to Malware

Spyware. Malware. Ransomware. There are a lot of different names for viruses today. Let’s start with the terms. Spyware Spyware is a creepy virus that is designed to pull information from your computer. Spyware is designed to run on your computer without your...
Back To Dongles We Go: Google’s Security Key.

Back To Dongles We Go: Google’s Security Key.

Déja Google Security Key If you’ve ever worked in a corporate setting, you’ve probably had a few of these kicking around: While not a true dongle, the RSA SecurID was a way for banks and security-heavy companies to introduce two-factor authentication to...
Public Wifi: Still Risky

Public Wifi: Still Risky

Public Wifi Safety = Nope In a recent story on Medium, Maurits Martijn had his mind (and passwords) blown by a hacker. Not every coffee shop holds a sinister kid in a hoodie but you should get in the habit of securing your connections regardless of where you are. The...