Avast Blog – 6.30.20 (6.29.20)
As your business grows and you take on more employees, the time will come where you need a server to keep your office network and business running efficiently. But with a seemingly endless array of choices and important decisions to be made, you might be wondering where to start. Luckily, setting up a server for a small business doesn’t have to be difficult.
Source: How To Set Up A Server For Small Businesses
Avast Blog – 6.29.20 (6.26.20)
Security researchers have discovered what they believe to be a global surveillance campaign whereby attackers were using malicious Google Chrome browser extensions to steal data and spy on over 100 networks. Threatpost reported that the researchers suspect millions of Chrome users were targeted across the industries of financial services, oil and gas, media and entertainment, healthcare and pharmaceuticals, and government organizations. The malicious extensions could surreptitiously take screenshots, log keystrokes, read the clipboard, and more. They were free and marketed as browser helpers that convert files or alert users when they land on a suspicious website. After reading the report, Google removed 106 browser extensions from the Chrome Web Store.
Source: Google Removes 106 Malicious Chrome Extensions
Webroot Blog – 6.25.20
It didn’t take long for COVID-19 to completely alter the way we work. Businesses that succeed in this rapidly changing environment will be the ones that adapt with the same velocity. In our second installment from The Future of Work series, you’ll hear from Webroot Product Marketing Director George Anderson, who shares his perspective on how businesses will need to adapt and evolve to stay on course during and after the global coronavirus pandemic.
Source: Old Habits vs. New Normal in the Time of Coronavirus
Avast Blog – 6.24.20
As cloud-based technologies become the tool of choice for today’s global workforces, keeping businesses protected from web-based attacks is a primary challenge for IT service providers.
First, let’s look at how encryption is used to keep web traffic safe. For example, hypertext transfer protocol secure — or HTTPS — uses encryption technologies like transport layer security (TLS), and previously secure socket layer (SSL), to keep Internet users and cloud services safe by securely connecting web browsers and apps to websites. In fact, because HTTPS ensures these connections stay safe, security best practices recommend that any website or web services that require login credentials should be using HTTPS.
Source: Understanding Encrypted Attack Types and How They Work
Ivacy VPN Blog – 6.23.20 (6.18.20)
There is a burning debate going on! The debate is about a question. And that question is: ‘Is torrenting illegal?” Let me put it in simple words. “Is downloading a torrent file illegal?” Got it? Not yet? Let me put it in more simple words. “Is downloading a file via torrent websites illegal?”
Source: Is Torrenting Illegal?
1Password Blog – 6.19.20
I’ve been using my time stuck at home to catch up on the movies and TV shows in my digital queues. While my Apple TV makes it easy to access the right streaming app to watch Grey’s Anatomy or Avengers: Endgame, having to individually enter the passwords for each app can be frustrating.
Source: Log in with ease on Apple TV