Blog

Your passwords are not secure

Your passwords are not secure

A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case according to the National Institute of Standards and Technology (NIST). On the hook for the password best practices that we still use today — the combination of letters, capitalizations, and numbers — NIST admits that the existing guidelines were misguided.

New vulnerability discovered in High Sierra

New vulnerability discovered in High Sierra

The macOS operating system has a reputation for being impervious to security risks, but according to recent news, that’s not always the case. In High Sierra, even someone with zero IT experience can steal your password. Here’s how to stop them.

What is the bug?

The vulnerability pertains to sweeping changes in how macOS stores files.

Handy updates in Google’s website creator

Handy updates in Google’s website creator

Does your business rely on internal websites and “wikis”? If so, you might want to use Google Sites, a design platform that makes it easy for G Suite users to build their own sites without having to learn HTML, CSS, and other coding languages. It now has better features, which users will definitely find beneficial to their site projects.

Virtualization vendors work together

Virtualization vendors work together

Until recently, business owners had to choose between cloud-based virtualization and on-premises virtualization. Although implementing either option from scratch was affordable, moving an existing on-premises setup into the cloud was expensive. Thankfully, two of the biggest virtualization vendors are working together to make this problem a thing of the past.

How to avoid entrepreneurial hackers

How to avoid entrepreneurial hackers

Another Windows security vulnerability has been released, and it looks as though it will be only a few weeks before the next one arrives. How do we know this? Because a group of hackers are openly selling their secrets to whoever will pay. Read on to learn how to protect yourself from this dangerous group of cyber criminals.