What is Password Synchronization?

Passwords. Sometimes it’s the only important attribute that stands between your important data, information and a hacker. We’re told time and time again that we need stronger and robust passwords as this will prevent cyber-attacks, and yet we continue to use easily guessed passwords (though we’re getting better). Edward Snowden exposed the NSA for questionable […]

Read More…

Cyber Security is an Important Factor for Businesses

We’ve reached the middle of the year where businesses have begun to take their data security more seriously. A reason to this can be the increased number of attacks taking place. A recent report done by Cisco outlines that employees are still an easy target when it comes to cyber-attacks and protecting data. A leading […]

Read More…

Identity Theft on the Rise for Businesses and Consumers

The latest news in regards to businesses being hacked, with millions of consumer data being stolen in each case, consumers have made the threat of identity theft their number one concern as we end 2014 and head into 2015. What’s worse, 2014 was the second year in a row in which identity theft has affected millions […]

Read More…

The Shellshock Q&A

What is Shellshock? The ‘Bash bug’, most commonly known as Shellshock is typically located within the command-line shell that is used within many Mac, Linux and UNIX operating systems, which can leave websites and devices powered by these operating systems open to risk. How does it work? Bash supports the export of not just shell […]

Read More…

The Shellshock Q&A

What is Shellshock? The ‘Bash bug’, most commonly known as Shellshock is typically located within the command-line shell that is used within many Mac, Linux and UNIX operating systems, which can leave websites and devices powered by these operating systems open to risk. How does it work? Bash supports the export of not just shell […]

Read More…