Watch Out for Malicious Browser Extensions

Browser extensions are nifty little programs that can be implemented into your web browser itself, adding onto its capabilities and utility. Unfortunately, these programs also give cybercriminals a means of secretly launching an attack. The security firm Avast recently identified 28 such third-party extensions that have been installed by about 3 million people on Google […]

Some Consumers are Aware of Data Privacy, But Not Enough

With the holidays approaching and the global pandemic still underway, online shopping is going to be under even more demand than usual in 2020. With all of these transactions online, it would stand to reason that people would be more keen to follow best security practices than ever before. This week, we take a look […]

Phishing In Your Text Messages

As serious as they are, cyberattacks are not always labeled with the most serious-sounding names. We are, of course, talking about phishing: the use of spoofed email addresses and fraudulent messages to get hold of data. One of the silliest-sounding versions of phishing — smishing — has proven to be of particular risk.

Clearing the Ethical Hurdles of Employee Monitoring

Employee monitoring is the practice of keeping an eye on your employees and their computer activity during work hours. This isn’t exactly a new practice, but with remote work suddenly seeing a huge boost in popularity, many businesses have sought to confirm that their workers are spending their time as productively as possible. If you […]

CAPTCHA and Its Many Challenges

We’re all familiar to some degree with the security measure known as CAPTCHA. You usually see it when filling out forms or logging into sites online, where you have to prove you’re a human being by identifying which of a variety of images fit a certain description. You may have noticed that these tests have […]

What You Need to Know to Stay Ahead of Hackers in 2020

It is nearly impossible for the modern business to stay ahead of every cyberthreat. It is just too much to proactively ward against. Today’s best practices will try to keep your network from being breached and your data from being stolen, but they may just allow you to understand how your network was breached and […]