Continuing our 2022 Security Recommendations series, in this post, we will discuss why it’s important to use encryption at rest in all your devices. What is Encryption at Rest? In simple words, encryption at rest is the process of securely…
Many of the topics that we will cover in this new series are common sense; however, every year, we need to revamp our personal security practices in person and online. This installment will cover how we can protect our personal…
In an increasingly online world, cybersecurity has become more critical than ever. This is particularly true for companies and organizations that handle personal or sensitive data of consumers and citizens. Why is Cybersecurity so Important? With the huge prevalence of…
Now that we have covered backing up your computer and mobile devices locally using an external hard drive or a NAS, we can now set up our final security measure: backing up data via third-party cloud service. There are many…
This article is the first entry in the Security Monthly series, where we will discuss recent and important events regarding security incidents, data protection, notable attacks, and related topics. To kick off our series, we will cover four attacks that…
Back Up Your Mobile Device Following our first article on the 3-2-1 Backup Strategy, we are now going to discuss backing up your mobile devices (smartphones, tablets, etc.). While both Android and iOS devices have their own cloud storage backup…
Many people know that backups are a good idea, yet not everyone acts to ensure their data is backed up in case a device is stolen, lost, or damaged. By device, we’re not specifically talking about your smartphone; this term…
What is SSO? Single sign-on (SSO) is an authentication scheme that allows a user to log in with a single ID and password to any of several related, yet independent software systems. True single sign-on allows the user to log…
Software is not like wine and cheese, it does not get better with age, on the contrary, security strength decreases over time because of software obsolescence. Data security has always been important. But since more people are working remotely as…
What if instead of building a solution that processes and collects logs and security events, you could push the problem to the cloud through an encrypted channel? As a result, you would easily get detailed reports about threats to your…