• May 31, 2019
  • Glyn Moody
  • Cryptocurrency, Cybersecurity, General Privacy News,

How much is good online security worth to you? How about $100,000?

Readers of this blog know that a VPN is an indispensable tool for today’s digital world. VPNs address a key part of the challenge of staying safe online. They protect how data is transmitted between an Internet site and the user’s computer, and help to maintain privacy during transit and more widely. But there are … Continue reading “How much is good online security worth to you? How about $100,000?”

0

  • Nov 24, 2018
  • Summer Hirst
  • General Privacy News, Guides,

What is Two-Factor or Multi-Factor Authentication?

A colleague got to know your password and BAM, your account is hacked. Strong passwords are good. But they’re not good enough. That’s why you need two-factor or multi-factor authentication. It’s an extra layer of security that requires hackers to need your password AND another piece of information to gain access to your account. This … Continue reading “What is Two-Factor or Multi-Factor Authentication?”

0

52% of British Millennials Fail This Digital Hygiene Test (And You Probably Do Too)

They’ve been dubbed the digital generation, but research indicates that millennials’ cybersecurity instincts can often be just as poor as those of their elders. The latest evidence of this trend comes from a new survey conducted in Britain, which — the BBC reports — found that 52 percent of respondents aged 18-25 are using the … Continue reading “52% of British Millennials Fail This Digital Hygiene Test (And You Probably Do Too)”

0

  • Aug 29, 2017
  • Glyn Moody
  • Cybersecurity, General Privacy News,

Is this the key to foiling phishing attacks? Spoiler alert: probably

As readers of this blog know, VPNs are a great way to protect your privacy and security. But they address only some of the online threats we all face every day. Another important class of problems are caused by attacks that lead to accounts being taken over, identities being appropriated, data theft and financial losses. … Continue reading “Is this the key to foiling phishing attacks? Spoiler alert: probably”

2