Choose the right VPN for you by understanding VPN protocols

Understanding the best VPN for you or for your business may feel daunting because there are so many VPNs available with so many different setups. When choosing the right one, you may not be aware of the different security protocols used by the myriad VPNs. We’re here to help! Below is an explanation of protocols […]


Read More...

How to up your privacy game by encrypting your devices

Apple was in the news last year for battling it out with the FBI over encryption. During that time, John Oliver, the popular “Last Week Tonight” HBO host, chimed in to help Americans understand why encryption matters. Because it does! He said, “Beneath the shiny, rose gold surface, they [Apple], like other software companies, are […]


Read More...

Does Your Age, Sex, and Location Make You a Target for Cybercrime this Cyber Monday?

Do you know how likely you are to become a victim of internet crime, fraud, and identity theft based on your age, sex, and location? With Cyber Monday just around the corner, you need to be aware. The United States loves to shop online. According to a recent study, ecommerce is growing 23 percent year-over-year, […]


Read More...

OpenVPN Warns of Dangerous Fake Phone Security Alerts

Some mobile phone users have been given a security warning to download a virtual private network, something security experts warn is never legitimate. OpenVPN, Inc is warning people to be aware of another twist in an online scam:  a fake warning that insists phone users download a Virtual Private Network (VPN) in order to protect their […]


Read More...

Your mobile privacy matters: 29 steps to safeguard your phone

Your smartphone has a ton of data about you stored on it. Your employees’ smartphones have a ton of data about your business stored on them. Do you know what steps, in addition to locking phones, should be taken to keep that data private and secured? Here are important tips to follow. Because it matters! […]


Read More...

The differences between corporate and personal VPN uses

A VPN, or Virtual Private Network, creates an infrastructure for the user to access a private network, but many users may think it’s only needed to access a company’s network. Corporate access is a common use, but the privacy that can be afforded individual users is an important use as well, especially in today’s connected world where […]


Read More...

3 reasons to use VPN you haven’t thought of before

If you’re familiar with a VPN, you’d think of it for some of the more obvious uses, such as connecting to a corporate network, getting around region restrictions, and hiding your online traffic from your internet service provider. Just for the fun of it, let’s see if you thought about these three reasons for using […]


Read More...

The nail in WPA2’s coffin: how the KRACK hack affects every Wi-Fi user

Last week, we had no idea WPA2 had a coffin, let alone any nails in it, but today, it’s all over the news, from Forbes to Newsweek to The Next Web with their clever copywriting. WPA2′s security is now considered dead—six feet under—putting us all at risk. How and why? Here are questions we all have […]


Read More...

Top trends for cyber security in 2017 and what to do about it

 Cyber security is a big deal. It’s getting bigger each year. Each breach gets greater publicity, worries more customers, and can demolish a business’s brand. Gartner reported the top cyber security trends for 2017. Here’s a rundown of what those are with some tips, from us, on how to prepare for them. Cyber security needs change continually. […]


Read More...

Where should you start to create a strong cyber security framework?

The NIST framework for cyber security is a living document that details five areas of focus your business can use as the outline for filling out your cyber security portfolio. We’ve provided a summary of each so that you have a starting point for taking the next steps to protect your business’s data. Think of the information […]


Read More...