It’s Safe To Remove Bloatware

Like it or not, device manufacturers LOVE to stuff your brand-new PC, tablet, or phone full of “free” applications (they get paid to do it, so there's a slim chance of getting one without a side of spamware - aka bloatware). But clutter is the enemy of a speedy PC, and outdated apps are a breeding ground for hackers; so if you’re not using a particular software on a regular basis, it’s best to REMOVE it completely.

If You Installed It, You Need To Update It!

There are thousands of hackers who get up every morning with ONE goal in mind: to find a new vulnerability in a commonly installed software (like Adobe, Flash or QuickTime) to access your computer. That’s why these companies frequently issue patches and updates for KNOWN security bugs; and once a KNOWN vulnerability is announced via a patch, hackers get to work like crazy trying to figure out how to use the vulnerability and access those users who are lazy about installing updates.

The DANGERS Of File Sync Apps

If you’re using Dropbox, OneDrive, Google Drive, or other consumer-grade file sync and sharing cloud applications, listen up! These applications pose a huge threat to your company because company data can be spread far and wide without central oversight of what information is being shared with whom.

Use Bookmarks To Visit LEGITIMATE Websites

Here’s a sneaky trick used by many hackers: they purchase and set up a fraudulent website that is a close misspelling of a legitimate one. Example: (extra “o”) or (instead of .com). All you have to do is accidentally fat-finger ONE letter in the URL and up pops a very legitimate-looking fake copy of the site you were trying to get to – and the login and links are full of keylogger malware and virus landmines waiting for you to click on them.

Tips For Using Public WiFi Safely

We’re all guilty of it: connecting to free public WiFi. Whether it’s at the coffee shop, hotel, or airport, the temptation to check e-mail and surf the web is just too strong to resist. So BEFORE you connect to any free, public WiFi, make sure the connection is legitimate.

What is the “Dark Web”?

The “Dark Web” or “Deep Web” is a part of the World Wide Web we know and love that is ONLY accessible via a special software that allows users and website operators to remain completely anonymous and untraceable. That’s why it’s the playground for hackers and cybercriminals.

Ways To Spot A Phishing E-mail

A phishing email is a bogus email that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular website or to click and download a virus.

Avoid Being A Victim Of Ransomware

Remember the WannaCry ransomware attack that was all over the news? It infected over 400,000 computers. The threat was fairly straightforward: Pay us or we’ll erase your files.

Ransomware, like the WannaCry attack, works by encrypting your files to prevent you from using or accessing them.