3 Helpful Ways To Limit Screen Time for Kids & Teens

3 Helpful Ways To Limit Screen Time for Kids & Teens

When working with parents to create personalized internet safety plans for their families, we often hear concerns about screen time. Prolonged screen time is especially common this time of year. Kids are getting out of school and have more unstructured time to spend flipping through their smartphones or tablets, or sitting on the couch playing videogames.

Based on a recent report by the American Association of Pediatrics, parents’ worries about screen time are legitimate. While there are certainly benefits to kids and teens interacting with technology – for example, educational apps and staying in touch with extended family – there are still good reasons for placing healthy, age-appropriate limits on screen time.

Read More

3 Ways Your Business Can Benefit From Remote Monitoring and Management Software

If you’ve outsourced your technology needs to a managed service provider (MSP) within the last decade or so, you’ve probably heard about remote monitoring and management (RMM) software. When listed in an agreement or on an invoice, that line item might raise at least a couple of questions: “What is this, and do I really need it?”

Read More

Password Managers: What They Are, and How They Can Protect Your Life Online

By now, we’re all used to using passwords to authenticate our identities online. But as we’ve grown more accustomed to coming up with and remembering passwords, cybercriminals have gotten far better at stealing them. The result is that many of our online accounts are at high risk for breach, especially because most people have bad habits when it comes to passwords. A study in 2015 found that nearly 3 out of 4 people use the same password for multiple accounts, and that 68% of people were using passwords that were five years old or older. Unsurprisingly, this same study found that 2 in 5 people surveyed had experienced some sort of security incident online.

The problem, of course, is that good password habits are difficult to learn and even harder to carry out. Thankfully, tools now exist that can drastically improve your password security. They’re called password managers.

Read More

5 Reasons to Consider Data Center Colocation for Company Assets

When businesses are deciding where to host their vital resources—email, key applications, and company data—the conversation usually revolves around two options: company-owned servers at the office or servers owned and maintained by a cloud vendor (commonly referred to as “the cloud”). But a third option, though not discussed as often, might be a better fit for some businesses. And that’s data center colocation.

Read More

Yik Yak: A Social Media App That’s Unsafe for Kids and Teens

Yik Yak: A Social Media App That’s Unsafe for Kids and Teens

A couple months back, we reviewed a social media app called After School. Because the app allows teens to post anonymously, we raised the caution flag. We acknowledged, however, that After School’s developer does seem to have implemented some important safeguards to minimize inappropriate or dangerous content. Yik Yak is a different story.

Like After School, Yik Yak is asocial media app that allows it’s users to post anonymously. Unlike After school, the app contains relatively few safety features to protect younger users.

Read More

How To Use Two Factor Authentication To Protect Your Data And Peace Of Mind

As we continue to move more aspects of our daily lives online, cybercriminals are developing more sophisticated ways of hacking our accounts and stealing our passwords. From banking to grocery shopping to managing household appliances, we’re putting ourselves at risk every time we create a new account. It’s gotten to the point that usernames and passwords just aren’t enough to protect our privacy. 

Read More

Scam Alert: "Malware Warning" Pop-Ups

We’ve written in the past about phone scams where a criminal poses as a representative from “Microsoft Support,” asking for credit card payment to perform some necessary maintenance on someone’s computer. Thankfully, increased education on cybersecurity has raised consumer awareness of scams like these, but criminals have gotten even smarter at figuring out ways to steal your information.

Over the last six months, and increasingly in the last few weeks, though, we’ve seen multiple instances, as well as reports from others, of a new variation on this scam, which is even trickier.

Read More

3 Tips for Protecting Your Smart Home Devices from Hackers

Think you may be getting tech gifts this Christmas? Smart home devices—from light bulbs to thermostats to coffee pots—make great gift items. These devices, referred to collectively as the Internet of Things (IoT), are on the frontier of tech innovation, changing the way we interact with everyday household items in some helpful ways.

But with these innovative new devices come security risks.

Read More

Don’t Get Hacked. Encrypt Your Email.

f you’ve been paying attention to the news in recent weeks, you’ve been hearing about high-profile email hacks. Individuals or state actors have stolen and begun releasing the contents of a certain presidential campaign’s emails to the press.

Now, setting aside any political elements to these recent stories, the technical side of them should be downright terrifying to businesses and individuals who send sensitive information over email. While the Clinton campaigns email hacks were actually the result of a phishing email, the bigger picture behind the news stories is that email is an incredibly insecure means of communication.

Read More

9 Must-Read Posts for National Cyber Security Awareness Month

9 Must-Read Posts for National Cyber Security Awareness Month

October is National Cyber Security Awareness Month! This is a great opportunity to raise awareness about a topic that is more pertinent than ever, as recent headlines show, and affects all businesses and organizations. To help in that effort, below is a curated list of helpful articles from our resource archives. All nine of these articles give businesses and organizations practical advice on how to keep their data safe. Read through them, and share this post with your friends and colleagues!

Read More