Warning: It’s Now a Crime to Share Your Netflix Password

netflix_password_sharing_no_no_400.jpg

“What’re you in for?” a prison inmate asks. “I shared my Netflix password with my sister,” you say. This conversation might be absurd, but according to a recent ruling in accordance with the Computer Fraud and Abuse Act, it’s one that could actually happen. Now, sharing your Netflix password to let someone catch up on […]

Mark Zuckerberg’s Recent Password Blunder is an All-Too-Common Problem

password_security_400.jpg

In a recent hack attack, Twitter had 33 million user login credentials stolen. This is unfortunate, but not surprising; an incident like this routinely makes the headlines. Although, what is surprising is what this hack reveals about people’s poor password security habits. An analysis of the millions of stolen credentials by security company LeakedSource shows […]

A Law From 1986 Shouldn’t Govern Email Privacy in 2016

congress_to_hear_arguments_for_ecpa_reform_400.jpg

Are you familiar with the protections in place that ensure that your digital communications remain private? What’s keeping an entity like the government from going through your emails? In the United States, the government uses a loophole in an outdated law to access the digital information they want from its citizens. If you’re concerned about […]

The Super-Creepy Reason Why You’ll Want to Secure Your Surveillance Camera

b2ap3_thumbnail_dvr_iot_issues_400.jpg

With approximately 5.5 million new devices being connected to the Internet everyday, the Internet of Things presents the biggest security challenge to date for IT professionals. Essentially, an IoT device that’s not secured can easily fall prey to hackers, and with so many different devices being connected, it’s easy to overlook a device or two, […]

Tip of the Week: How to Add a PIN to Your Windows 10 Login

b2ap3_thumbnail_windows_10_pin_400.jpg

The fact that so many businesses are rushing to take advantage of two-factor authentication displays how the password has lost its edge as a security credential. Passwords simply aren’t good enough anymore, and hackers are always finding ways to crack even the most complex passwords. This is why many businesses are looking to improve security […]

Tip of the Week: How to Let a Friend Use Your PC Without Compromising Your Data

b2ap3_thumbnail_guest_account_400.jpg

We’ve all been in a situation where you’re asked by someone if they can use your personal computer for whatever reason; checking their social media, email, or just browsing the Internet. Some people, however, also want to protect their privacy, and allowing relatives to use your own account can become problematic. A quality solution to […]

Tip of the Week: Make Your Password Rhyme Every Time

b2ap3_thumbnail_security_for_your_passwords_400.jpg

Password security is quite the conundrum. We want our passwords to be easy to remember, but the problem is that passwords that are easy to remember are often simple and insecure. Therefore, it becomes a best practice to use complicated passwords with both upper and lower-case letters, numbers, and symbols to compensate. The “passpoem” might […]

Tip of the Week: 3 Facebook Security Tips to Protect You and Your Friends

b2ap3_thumbnail_facebook_security_400.jpg

With social media playing such an important role in everyone’s day-to-day lives, one has to wonder to what degree this affects the security of online accounts and profiles. Social media might have revolutionized the way we communicate with others, but it’s also revolutionized the way that hackers stalk their victims. How vulnerable are you and […]

Tip of the Week: My Company Device Has Been Lost or Stolen, Now What?

b2ap3_thumbnail_lost_devices_can_be_a_major_problem_400.jpg

Mobile devices are one of the hottest items for thieves to target. According to reports from Consumer Reports and LoJack, 2013 saw the theft of two million laptops and three million handsets. What this means for you is that having your mobile device stolen is probably a lot more likely than you would think. The […]

3 Easy Ways to Go Incognito In Google Chrome

b2ap3_thumbnail_incognito_mode_400.jpg

The Internet can be a dangerous place. Sometimes you want to keep your identity a secret on the web. Now, your reasons for doing so aren’t any of our business, but you should know that there are several ways to access this secretive function in Google Chrome. Here are three ways you can take advantage […]

Your Computer Can Identify You Based On How You Move Your Mouse

b2ap3_thumbnail_mouse_security_400.jpg

Any user of technology knows that it’s important to optimize security on all fronts of your business. The only problem with this is that passwords aren’t as secure as they used to be. Many businesses have moved in the direction of two-factor authentication, which requires a secondary credential in order to access an account. Did […]

Forget Passwords: Access Your Phone By Identifying Pics of Familiar Faces

b2ap3_thumbnail_facial_recognition_400.jpg

With all the hacking attacks we’ve seen in the news, it’s painfully obvious that using passwords just isn’t enough to protect our information. We now have more security measures available than ever before. One of the more unique and effective solutions to have surfaced is Facelock, a clever solution that grants access based on how well […]

What Really Happens when Websites Collect Your Personal Data

b2ap3_thumbnail_entering_personal_data_online_400.jpg

You might be aware that some websites collect personal data from you depending on your mobile device’s location, your browsing history, and several other factors. This information is generally used for marketing, but it could have unforeseen effects on the way you browse the Internet. It can be fairly revealing about your personality, or possibly […]

Biohacking: Integration of Smart Technology with the Human Body

b2ap3_thumbnail_nfc_payment_400.jpg

Wearable technology is still emerging, but a much different type of smart tech is coming soon. At the Kaspersky Labs Security Analyst Summit, the question of whether or not embedding technology in the human body is a viable concept was discussed in detail. This is supposedly the future of smart technology. Hannes Sjoblad, a member […]

What is your Identity Worth to You?

thumb identity

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let’s talk about a few of these statistics and what it means.

How Safe is Your Email?

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Michigan small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.