Mobile security threats in Android

Mobile security threats in Android

Employees today are working under tight timelines, but thanks to bring your own device (BYOD) policies, they can access critical files and applications to get work done on their smartphones. But BYOD can be a double-edged sword to those who are not vigilant about cyberattacks. If you’re using an Android device, here are five security […]

Leave no room for hackers to operate

Leave no room for hackers to operate

For most people, social media is a convenient way to stay in touch with family and friends. For a small group of people, it’s an opportunity to profit off other people’s trust. Here are some things you can do to continue enjoying Facebook and Twitter without compromising your privacy. Lockscreens exist for a reason Make […]

Social Media and HIPAA Compliance

Social Media and HIPAA Compliance

Before Social Media platforms like Facebook went live, HIPAA was established to protect the privacy of medical providers and their patients. And although there are no specific rules for Social Media use, every healthcare organization must implement security protocols that adhere to privacy policies. On April 14, 2003, the “Health Insurance Portability and Accountability Act” […]

Protect your Facebook data with these 3 steps

Protect your Facebook data with these 3 steps

Facebook users woke up to a nightmare when they heard that the social media giant and associated app developers were selling their sensitive data to companies, like Cambridge Analytica, without their consent. So if you’re concerned about being one of the 50 million users whose data have already been sold, you should check out the […]

Extra security features for your Android device

Extra security features for your Android device

Mobile devices contain a lot of personal information; you can almost say its an extension of ourselves. With our checkins, bank transactions, email exchanges, browsing behavior, and other personal data stored in one device, losing your smartphone can feel like a disaster. Luckily, there are security tools on Android devices you can use to tighten […]

Beware of what you save in web browsers

Beware of what you save in web browsers

Passwords are a double-edged sword. If you make them too simple, they’ll be easy to guess; if you make them too complex, they’ll be impossible to remember. One solution is to create an uncrackable password and save it to your browser. Unfortunately, recent research suggests that tactic could drastically reduce your privacy. Why auto-fill passwords […]

VPNs: Why you need them

VPNs: Why you need them

Installing powerful antivirus software and setting strong passwords are no longer considered the bare minimum in cybersecurity. With hackers, government agencies, and ISPs constantly monitoring networks and your online habits, hopping onto a Virtual Private Network (VPN) is crucial for keeping your surfing habits private. Here’s why. What is VPN? Simply put, a VPN is […]

MR to be removed from Google search

MR to be removed from Google search

If you imagine medical records as being stored in a cabinet somewhere in your local hospital, think again. Until quite recently, medical records were publicly accessible via Google. In an effort to prevent cybercriminals from capitalizing on these resources, Google has removed sensitive medical records from appearing in search results. If an individual’s medical records […]

Docs.com shares users’ sensitive files

Docs.com shares users’ sensitive files

Have you recently created and uploaded a Microsoft file on Microsoft’s free document-sharing platform, docs.com? Did you know that other than yourself and the small group of people you wish to share documents with, your uploaded documents can be publicly viewed and searched via Google or Bing? Regardless of your reasons for using docs.com, your […]

How Google overcomes secure browsing issues

How Google overcomes secure browsing issues

It’s safe to say that malware attacks, phishing scams, and social media engineering practices are going nowhere fast. That means that, whether you are a home user or the owner or manager of a small or medium-sized business, if you choose to ignore safer online security practices you are putting your identity and the security […]