Zoom is a video conferencing application that, as the coronavirus pandemic reared its ugly head, saw a considerable leap in popularity amongst organizations of every kind as well as private users. However, this leap also helped bring some serious security issues with the platform to light. Let’s check in and see how Zoom has since worked to improve their user protections.
For millions of people their phone is their most important device. In fact, many people do their computing exclusively on their smartphones. Today, the best devices give people the option to do anything they need to do from the palm of their hand. Let’s take a look at some of the best smartphones available to consumers today.
This year has been…interesting, to say the least. One minute businesses were running normally. Seemingly overnight, many of us got the work-from-home position we always wanted. Within and beyond the pandemic, many companies have been transitioning portions of their workforce to work remotely. As technology marches forward, the image of the modern office changes with…
In June 2020, Microsoft updated their popular Outlook email platform in Microsoft 365, adding (among other things) an integrated polling feature. Let’s take a few moments and go over how to use it so you are better able to take advantage of the opportunities this tool can provide.
The Federal Communications Commission has begun to target social media companies in what seems to be part of an overtly political act by the White House ahead of November’s elections. Today, we will take a look at Section 230, how it currently gives social media power that some politicians are uncomfortable with, and what they plan to do about it.
The COVID-19 pandemic has been jamming up business progress for over half of 2020 and it has led a lot of organizations to push off any new technology investments or to find hosted solutions that will allow them to meet their current business demands. On the surface, these cloud investments are a great way to secure the resources your business needs, but it can have an alternate effect. Today, we take a look at how cloud computing can be just too expensive, even if it doesn’t carry large upfront costs.
Phishing attacks are a fashionable strategy for many cybercriminals and have been for some time. From the infamous Nigerian Prince email scam to the generic urgent message from the bank, most people have seen at least one example of phishing hit their inbox.
If you’ve been on the internet lately, you’ve probably seen pretty aggressive advertising for VPN services. On paper, they seem like something that can give you anything you would want in your online browsing in terms of security and access. Continuing our Cyber Security Month series of articles, we’ll be covering this apparent modern miracle of…
“To confirm you’re a human being, select all of the images that include traffic signals.”
Chances are good that you’ve seen such a requirement before as you’ve spent time online, whether you were filling out a form or logging into a website. Whether it was an evaluation like the one above, or simply one where you needed to identify a highly distorted series of alphanumeric characters, you probably have also noticed these tests getting more difficult as time has passed. The reason for this is simple: computers are getting better at beating them.
October is National Cybersecurity Month and password security is a big part of that! Cybersecurity is so important and appropriate to discuss considering how scary it is out there! As we regularly cover, hackers are getting more advanced by the day, despite security measures improving by leaps and bounds. Of course, no monster is all-powerful…