How to turn off intrusive Windows 10 settings

With Cortana following you around — from spamming helpful suggestions based on what you’re typing to displaying extremely precise and personalized ads based on your online search — Windows 10 can often feel intrusive. Here are a few tips you can follow to leave Microsoft’s watchful eye behind. Turn personalized advertising off For those unaware, […]

Issues found for new Windows patches

Despite security being one of Microsoft’s top priorities, it has been recently discovered that there are two vulnerabilities in computer chips, named Meltdown and Spectre, that put private data in jeopardy. As a solution, Microsoft has released an update to fix this vulnerability. Issues with Microsoft’s Spectre and Meltdown patches After the January 3rd announcement […]

Beware of the Meltdown and Spectre patches

Installing security patches is usually such a humdrum task that even the most inexperienced users handle it. Unfortunately, that has not been the case with the Spectre and Meltdown fixes. This time around, we recommend you skip installing the update and let an IT professional handle it for you. Unsecured data storage Spectre and Meltdown […]

Bloatware: From Annoying To Dangerous

Bloatware, junkware, trialware, third-party apps — whatever you call it. There’s now yet another reason to get rid of these annoying pre-installed programs and plugins indefinitely: security threats. Learn more about the other risk that might do more than slow down your computer. Tavis Ormandy, a researcher from Google’s Project Zero, recently discovered that a […]

Apple releases another critical update

While Apple products are renowned for being highly secure, they’re not completely immune to cyberattacks. Fortunately, Apple frequently releases updates to fix any issue that they’ve discovered. And if you have macOS High Sierra, you need to make sure you’re running the latest patch. Serious bug On November 28th, security researchers reported a serious bug […]

Is your laptop spying on you?

Strict parents can monitor their kids’ online activities, law enforcement officers can see your outgoing messages, and some employers can (unethically) check whether employees are on Facebook during working time. All they need to do is install a keylogger on one’s computing device. Let’s get to know more about keyloggers and how you can protect […]

Beware of sneaky Microsoft Office malware

Cybersecurity systems are getting better at identifying and preventing attacks coming from all directions. At the same time, hackers are coming up with new ways to bypass these systems. While online scams are the most common ways to do this, cybercriminals have discovered a new attack method using Microsoft Office. What’s the new Office threat? […]

Healthcare providers and mobile devices

If you’re a healthcare services provider who utilizes mobile devices in daily operations, you need to ensure the patient data stored and handled by those devices are safe and private. Let’s take a look at mobile data security and some of the ways you can keep your sensitive patient information secure. Why does data security […]

Equifax’s Leak: lessons learned

No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident response, read the following story and recite this: […]

IoT security challenges for healthcare

From mobile apps that assist with taking medicine on time to smart appliances that monitor vitals, the Internet of Things (IoT) is becoming ubiquitous in healthcare. However, IoT’s expansion brings new risks, vulnerabilities, and security challenges for healthcare practitioners and their patients. IoT security risks Devices that contain a treasure trove of patient data are […]