Author Archives: Amanda Young
- Home
- Articles Posted by Amanda Young (Page 4)
Social media security
Social media is a great tool for SMBs to get the word out about their products and services, build their brand, and connect with prospective customers. It also offers paid marketing avenues as well, such as PPCs, marketplaces, etc., But are your social media accounts secure? Typically what happens
Five things to consider when investing in new software
When running a business, you will often find yourself in need of new software tools to enhance the productivity, efficiency, effectiveness and even the security of your various business processes. These software programs range across a wide spectrum of tools including accounting, finance, I
Insider threats: Not as uncommon as you think
When we speak of cybercrime and data theft, we typically think of seasoned cybercriminals. But you’d be surprised to know that the cause of businesses becoming victims of cybercrime is most often their own employees--sometimes on purpose, sometimes inadvertently. Remember Bob from account
Best practices for remote desktop access
Remote desktop access is an essential in these days when businesses are expected to be responsive to their clients almost 24/7. But, did you know that remote desktop access, while almost indispensable now, can threaten your network security? In this post, we discuss a few best practices tha
Why you should invest in a password management system ASAP
Password management tools are software programs that put up enough security and safety mechanisms in place to ensure there’s no password breach. Your employees can use the program to generate random, high-security passwords as per the industry best practices. They don’t have to worry a
Eight common password mistakes to avoid
Research points out that more 80% of data breaches happen due to password hacking, meaning that poor password hygiene is responsible for a majority of cybercrimes that follow data breaches. To make sense of this statistic better, let’s first look at what constitutes poor password hygiene.
How to manage cookies effectively so they are not a threat to your data
Avoid third-party cookies: Third-party cookies are primarily used for online advertising and retargeting, so you won’t miss anything significant by avoiding these cookies. So, whenever you see a cookie alert on any site, first, check if it is for third-party cookies and if yes, it’s bes
Everyone loves cookies–even cybercriminals
When you visit a site, probably for the first time or from a new device or browser, you will see an alert that mentions the site uses Cookies to offer you a more personalized experience and asks you if you are okay with it. Let’s admit it. A lot of us don’t even bother to read what the