11
Aug
August 11, 2020
Welcome to the new normal. We’re all now living in a post-COVID-19 world characterized by uncertainty, mass home working and remote learning. The lines demarcating normal life have shifted abruptly – perhaps never to return. That’s not the worst that can happen, as...
27
May
Here are 21 tips for staying secure, private, and productive while working from home on your Mac—while also making sure your personal “helpdesk” is in place, should you run into problems while doing your work....
14
May
Forced to work, study and socialize at home, the online digital world has become absolutely essential to our communications — and video conferencing apps have become our “face-to-face” window on the world. Let’s take a look at some of the key threats out there and...
15
Apr
April 15, 2020
As the world adapts work from home initiatives, we’ve seen many organizations accelerate their plans to move from on-premises endpoint security and Detection and Response (EDR/XDR) solutions to Software as a Service versions. And several customers who switched to the SaaS version...
31
Mar
The coronavirus pandemic—the infection officially designated as COVID-19—is causing upheaval across the globe. Aside from the serious economic and public health implications, one very practical impact of shelter-in-place dictums is to force many companies to support remote working where they can. Let’s take a look...
06
Jan
To help you stay safe over the coming year we’ve listed some of the biggest threats from 2019 and some trends to keep an eye on as we hit the new decade. Many of the most dangerous attacks will look a lot like the ones...
21
Nov
By: Trend Micro
November 21, 2019
Read time: 1 min (362 words)...
02
Sep
Routers play a crucial role, akin to a cyber front door for the smart home. Hackers are becoming increasingly adept at exploiting any security weaknesses on these devices to grab our data, install malware, and remotely control our smart devices....
17
Jun
Whether it’s just our name and email address or more sensitive information like Social Security and credit card numbers, this sharing of what’s known as personally identifiable information (PII) exposes us to risk. Why? Because hackers are looking for ways to steal and monetize it....
22
May
there are some simple steps you can take today to help reduce your exposure to IoT threats. Are they password protected? How are they updated? Are they running unnecessary services which may expose them to attackers? ...