Microsoft Edge browser becomes more secure

Microsoft Edge browser becomes more secure

Microsoft’s Edge browser has enhanced its security features with new virtualization protocols. By running the browser inside a virtual container, it keeps web content totally separate from the Edge browser and your hard drive. Although it’s a much smaller scale than what we are used to seeing out of Microsoft’s virtualization strategies, this is a gigantic boost to Windows’s native internet browser.

Social engineering and cyber security

Social engineering and cyber security

Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don’t have a clue about what is happening.

9 essential cybersecurity phrases

9 essential cybersecurity phrases

As with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cybersecurity, keeping up with them all can mean the survival — or demise — of a business. If you’re looking for a list of the industry’s most relevant terms, you’ve come to the right place.

Record $5.5 million HIPAA penalty doled out

Record $5.5 million HIPAA penalty doled out

If your organization hosts data regulated by the US government, you’re familiar with the scare tactics used to sell hosting services. But what lurks behind those vague threats of expensive lawsuits and unfair liability burdens? HIPAA is nearly 100 pages long and few providers actually know what it requires.

4 Social engineering scams to watch out for

4 Social engineering scams to watch out for

Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken center stage in the Rio Olympics. Using various scams, hackers can circumvent network security systems by convincing gullible users into giving away sensitive information.

5 reasons why you should switch to HaaS

5 reasons why you should switch to HaaS

Hardware-as-a-Service (HaaS) is not a new concept, it’s an old wine in a new bottle. Similar to Software-as-a-Service (SaaS), where you pay a monthly fee to a service provider in order to use a piece of software, HaaS lets you do the same and saves you from the nuisance of all the hardware upgrades, maintenance, and management.

5 simple but manageable security measures

5 simple but manageable security measures

Don’t be put off by the tech jargon of security experts you find in forums and self-help books. A managed service provider is what you need to break down complex security ideas into easy-to-understand language. However, they generally focus on installing and managing protection software that’s often far too complicated to operate without their help.