Is it time for a cyber security hygiene check?
One of the biggest problems with IT security is that hackers are finding new ways to break into your computer or steal your data every…
What Is AES Encryption? A Guide to the Advanced Encryption Standard
Whether it be sending and receiving emails, transferring files or simply browsing the web, data transfer exists everywhere in our technological world. In an age…
The 5 Pillars of IT Security (according to the NHS)
The UK government has announced 5 ways they plan to improve IT security in the National Health Service
What Is a Root Certificate? Differences Between Root and Intermediate Certificates
Root, intermediate and SSL certificates — oh, my! These are terms you may have heard while browsing online. But what is a root certificate, and…
Western Digital hit by hackers
Western Digital refuses to cooperate, which is giving momentum to the news nearly one month after it happened.
Cybersecurity for Kids: 7 Tips for Teaching the Basics
Reducing the gender gap in technology fields starts with teaching young kids. We have 10 cybersecurity lessons for kids that will encourage smart tech use.
Macbook Security: Do I Need Antivirus for Macbook?
Apple products are protected by an array of built-in security features, but they’re not impenetrable. No one wants to be blindsided by a virus or…