Blog Keylogger 101 We have all heard of hacking, virus, ransomwares, etc. as they keep coming up in…Steven TruongApril 10, 2022
Blog Social media security Social media is a great tool for SMBs to get the word out about their…Steven TruongApril 7, 2022
Blog Insider threats: Not as uncommon as you think When we speak of cybercrime and data theft, we typically think of seasoned cybercriminals. But…Steven TruongMarch 24, 2022
Blog Gaining a competitive edge during the pandemic The COVID-19 pandemic has been tough on everyone. The lockdowns, the need to follow social…Steven TruongMarch 17, 2022
Blog Best practices for remote desktop access Remote desktop access is an essential in these days when businesses are expected to be…Steven TruongMarch 10, 2022
Blog Five reasons to invest in a password management system ASAP Password management tools are software programs that put up enough security and safety mechanisms in…Steven TruongMarch 3, 2022
Blog Eight common password mistakes to avoid Research points out that more 80% of data breaches happen due to password hacking, meaning…Steven TruongFebruary 24, 2022
Blog How to manage cookies effectively so they are not a threat to your data Avoid third-party cookies: Third-party cookies are primarily used for online advertising and retargeting, so you won’t…Steven TruongFebruary 17, 2022
Blog Understand your Cookie to manage it better! There are 3 kinds of cookies, each having different functions. One of them is session…Steven TruongFebruary 10, 2022
Blog Everyone loves cookies–even cybercriminals When you visit a site, probably for the first time or from a new device…Steven TruongFebruary 3, 2022