computer

Password 2.0 – The future of identity verification

In this day and age, we are all too familiar with having to associate passwords with our computers, applications, email, online banks, etc. Identity fraud remains a serious concern for both individuals and businesses. Our identities are verified almost exclusively by one of two methods—things that you carry with you, such as a driver’s license or passport, and …

Password 2.0 – The future of identity verification Read More »

protect trade secret concept: folder secured with padlock

Secure the apps – The top 3 applications against cyberthreats

Last week, we discussed how to bulk up your security from your home base, but what about in the office? After all, the only things protecting your company’s infrastructure are the applications and knowledge of the people you’re working among. The 2015 (ISC)2 Global Information Security Workforce Study noted last April application vulnerability is the …

Secure the apps – The top 3 applications against cyberthreats Read More »