Our computer systems will never be entirely secure. New techniques and procedures are constantly evolving, being implemented to circumvent current security measures. When one attack method is too heavily defended against, attackers look for new, innovative ways to avoid detection, increase infection …
Security
What is 2-Factor Authentication and How Can it Keep My Data Secure?
In layman’s terms Two-factor authentication (2FA) can be thought of as “something you have, and something you know”. Essentially it is a security protocol that gives the data on your network an added layer of data protection by requiring users to verify their identity twice when logging on to their …
Internet Explorer patch arrives to fix critical vulnerability
Last week the internet went into meltdown after a critical bug was found in all versions of microsoft's internet explorer applications. The vulnerability known as CVE-2014-1776 allowed “An attacker who successfully exploited this vulnerability to take complete control of an affected system. The …