Google’s Take On 2FA

Google’s Take On 2FA

Phishing scams and brute force password attacks are on the rise around the world. For years now, security experts have been issuing the same advice: To secure your accounts turn on two-factor authentication. Two-factor places an extra layer of confirmation between...
Browser Extensions And You

Browser Extensions And You

Browser extensions are useful tools that can add functionality to your internet experience, but they are also being used more frequently as security loopholes, attack vectors for malware, or ways to show users more advertisements. So, what exactly are browser...
Working Safely Out of The Office

Working Safely Out of The Office

Today business runs on flexibility and many workers are using laptops or other mobile devices to accomplish their tasks in or out of the office. Data security is always an important consideration, but when a third-party network is added to the equation even more care...
The Cold and Your Computer

The Cold and Your Computer

This winter has proven to be a formidable one for the Midwest and we’ve started to see some issues occurring with people leaving their computers in cold cars. What happens when your computer is exposed to very cold temperatures? How Cold Is Cold? Most computer...
New Years Computing Checklist

New Years Computing Checklist

In the closing months of 2018, Microsoft released their latest large-scale update for Windows 10, under the umbrella of the “Update 1809.” This batch of updates to the architecture and security of Windows 10 is far from minor (weighing in with a footprint between 3...