Five to survive
The insider threat is grossly underestimated. While focusing on technical security issues remains vital, Snowden and the CIA leak illustrate…
Traveling with tech
All travellers should begin by carefully considering whether they actually need to take a device with them. For example, those…
First-rate firewall
All-in-one devices are attractive from a cost and simplicity perspective, especially when Internet Service Providers (ISPs) include them for free….
How Cloudflare stopped the bleeding
Tavis Ormandy, a respected security researcher with Google’s Project Zero, discovered the leak while analyzing Google search results. Ormandy wrote:…
Aegis Secure Key 3z – affordable and effective
The 3z is smaller, less expensive, and available in 8, 16, 32, and 64 GB capacities. As marketing manager Walter…
Practical password policy
Despite their weaknesses, passwords remain a dominant authentication mechanism, and the reason is simple: They are low cost and convenient….
Make the best email service decision
Free email accounts are provided by Internet Service Providers (ISPs), Google, Microsoft, Yahoo, and a numerous smaller providers. Since the…
Digital data beyond death
A generation ago, photos were kept in an album or slide carousel, and important personal information was on paper. Today,…
Got data?
Organizations hold an average of 569 per cent more data than two years ago, and are increasingly aware of its…
Farewell to the era of tolerating security negligence
According to the Google Security Blog, Chrome version 56, expected to be released around January 31, 2017, will warn users…
Reviews
SAMSUNG GALAXY S8 PLUS
The Samsung Galaxy S8 Plus is a beautifully crafted smartphone with nearly no bezel, curvaceous in design and reflects a…
How to: Connect to Exchange Online Using Multi-Factor Authentication
Using PowerShell to manage your Microsoft cloud services like Exchange Online and using multi-factor authentication (MFA) separately is awesome. Using…
Stay connected