Our personal email accounts enable us to send and receive messages instantly with people all around the world. While we primarily use our email accounts for communications purposes, many of us use it to sign up for accounts such as online banking, online shopping, social networks, and even alternative email accounts. But have you considered the possibility that your personal email account could be the weakest link? By “weakest link”, we mean that a compromised email account could potentially result in the accounts connected to it being compromised too. That’s why it’s important to address email security from the get go.
Continue Reading… How Your Email Account Could be the Weakest Link to your Online Accounts
Practically anywhere you go, you’ll come across public WiFi hotspots. However, this free service could spell trouble. We explore the security risks of public hotspots and what to consider before connecting to public WiFi.
Continue Reading… The Risks of Public Hotspots: How Free WiFi Can Harm You
It’s safe to say at one point or another, we’ve all used USB drives to transfer and retrieve files from one computer to the next. As convenient as USB drives are for this purpose, it’s also extremely easy for attackers to distribute malware in the same fashion.
Continue Reading… USB Drives: Are You Plugging Malware into Your PC?
In both cases, you have to be concerned about people breaking in, and in both your computer and your home, you need to be sure to lock the doors and turn on the alarm. But what happens if there are doors or windows at your house that you did not realize were open? Suddenly, fortifying your home just became more complicated.
Continue Reading… Zero-days: Exploits that take advantage of the unknown
If you’re an employee or someone who is looking for an employer, you likely have a LinkedIn account. Your LinkedIn account not only connects you other employees and employers, but it also contains personal information about your education, work history, and other contact information like home address, phone number, etc…
Continue Reading… How to Turn on Two-step Verification for Your LinkedIn Account