Blog

Biometrics authentication on smartphones

The World Wide Web Consortium recently launched the FIDO2 project, allowing users to log in to online accounts with fingerprints, facial scans, and voice recognition. This technology is now also available in popular mobile browsers like Chrome and Firefox Lite, which not only boosts security, but also makes account management much simpler.

Why you shouldn’t jailbreak your iPad

A lot of iPad users resort to jailbreaking to gain greater control over iOS. With a jailbroken iPad, you can download apps unavailable in the App Store and get additional functionality from apps installed on your device. However, this virtually unrestricted access to apps and features has its cons, not least of which are security issues.

Advanced anti-phishing features for Gmail

While cybercriminals create new malware strains or look for software vulnerabilities to exploit, other criminal minds happily rely on an old, yet effective, trick: phishing scams. Such scams persist because people still fall for fraudulent email that asks recipients to reveal personal information or download an attachment containing malware.

Solve these Office 365 security challenges

Microsoft’s Office 365 is a robust productivity and collaboration tool. Businesses are particularly drawn to its advanced features, flexibility, and cost-efficiency. But like other cloud-based platforms, it’s not immune from security risks.
Vulnerabilities in SharePoint
Businesses typically use SharePoint Online and on-premises SharePoint sites to store sensitive data like personally identifiable data.