Blog
Why use a Managed Security Provider?
Emerging Threats Cybercrime costs have increased by over 400% in the past two years. Hardly a week goes by without news of another data breach, ransomware attack, or cyber attack making front-page news. Analysts predict that...
Why use a Password Manager?
Why Use a Password Manager? I bet you use the same password across multiple websites, am I right? If you ask people if they like passwords most will say No. However, if you ask people if they like their password manager, many...
Have your passwords been leaked?
Data breaches happen more often than we know. Your passwords to different websites are often stolen and available to hackers on the internet. There is a website that lets you check this; it is called Have I Been Pwned. It lets...
What is Two-factor Authentication?
Passwords are everywhere. We use them to access our money, chat apps, even our social lives through social media. No matter how complex your password is, it is never enough to prevent account takeover because all it takes was...
Passwords are outdated, you need a physical security key.
I have bad news for you. If your password is weak, you are probably going to get hacked. What if I told you there was a key to outsmarting hackers? It's called a security key. It could be the answer to securing your entire...
4 Simple Tips to Protect Yourself Online
Use two-factor authentication(2FA/MFA) Use 2FA/MFA everywhere that you can. Your banking systems, Twitter, and Facebook all support the ability for you to enable an additional security feature that you may not be using. You can...
How can the principle of least privilege protect your company?
How can the principle of least privilege protect your company? The principle of least privilege is widely used in IT security. It can go a long way to reduce the damage an attacker can do if you do have a security incident at...