
“Do as I say, not as I do.” Are you an offender of telling your employees, coworkers, and even family members to practice proper digital security, but not always following…
“Do as I say, not as I do.” Are you an offender of telling your employees, coworkers, and even family members to practice proper digital security, but not always following…
Modern web browsers and password managers come with a feature called password autofill. This helps users store and automatically use their account credentials to access websites and other applications. While…
The National Institute of Standards and Technology (NIST) once said that a good password consisted of three things: upper- and lowercase letters, numbers, and symbols. However, the NIST has now…
Many businesses are adopting bring your own device (BYOD) policies as more employees work from home. The problem is, if you’re not careful, BYOD can expose your company to major…
When you think about it, your usernames and passwords are the ‘digital keys’ for unlocking all of your company’s data as well as your own personal information in the digital…
Some data breaches result from the theft of a user’s login credentials. To keep your business safe, you need to implement a two-factor or two-step authentication process. These authentication methods…
Everyone uses email to send and receive sensitive information, making it an attractive target for cyberattacks. The importance of email security is vital to your company’s operations, so applying the…
TikTok is a free social media app that lets you watch, create, and share videos with millions of users around the world. It is mainly used by 16-to-24-year-olds for sharing…
In 2003, the National Institute of Standards and Technology (NIST) stated that strong passwords should consist of upper- and lowercase letters, numbers, and symbols. Recently, however, the institute reversed its…