SEVEN STEPS TO PROTECT YOUR SMARTPHONE


Our previous blog posts have examined the various cyber-based threats posed to Smartphones.  In this post, we examine seven steps that you can take to help mitigate those risks:   1. Use Two Factor Authentication:   This is also known as “2FA” for short. Two factor Authentication means that you are using two layers of […]

Read More…


BE AWARE OF MALWARE


  Cybersecurity is a growing field in this developing technology era; it is something that any organization has to pay attention to because of the many cyber threats present in today’s society. Read the following blog post written by Chris Brook for Digital Guardian about potential, and very destructive, malware threats.     Being aware of […]

Read More…


The Top Security Threats to Smartphones


What are the top threats to smartphones in 2018?  There are many of them, and we will be examining them in detail over several blog posts.  We begin with Data Leakage and Unsecured Wi-Fi Hotspots.   1. Data Leakage: This is not a direct attack by a Cyber attacker per se but is a flaw […]

Read More…