by Eric Clemens | Nov 20, 2018 | Office
Office 365 is a complete cloud solution that allows you to store thousands of files and collaborate on them, too. In addition to its productivity features, the service comes with security and compliance solutions. These remedies help businesses avoid the crushing...
by Eric Clemens | Sep 13, 2018 | Security
Avoiding malware and online scams take a lot of work. You have to treat every email with suspicion, manage a long list of convoluted passwords, and avoid public WiFi networks. Ideally, you follow several other cybersecurity best practices. However many users don’t...
by Eric Clemens | May 14, 2018 | Android
Critical Android security issues have become somewhat of the norm in recent months. Hackers are developing a record number of cyber attacks that could compromise your mobile operating system. And they’re having more success than ever before. But there are some things...
by Eric Clemens | Nov 27, 2017 | Security
Passwords are your first line of defense against hackers. But over the years, they have developed plenty of methods to steal them. To gain a deeper understanding of how cybercriminals operate, Google analyzed the causes of leaked login credentials. The results From...
by Eric Clemens | Oct 23, 2017 | Security
In 2003, a manager at the National Institute of Standards and Technology (NIST) authored a document on password best practices. The document was aimed at businesses, federal agencies, and academic institutions. Now retired, the author admits that his document was...