TechGuard Blog


Our Message to You: Stop Using Facebook Messenger

If you’re an avid Facebook user, you more than likely use their convenient Messenger app as well. If that's the case, you may want to begin thinking of alternatives. Unfortunately, their platform is lacking serious security measures that may cost you...

How to Prepare in the Case of Another COVID Induced Shutdown

Preparing for another shutdown Surely you've heard of Severe Acute Respiratory Syndrome Coronavirus 2? What about SARS-CoV-2 or novel coronavirus-2019? COVID-19? Regardless of what you call it, we were all affected by it in March of 2020 when the US...

Windows Security Flaw gets Perfect Score

Microsoft Windows is no stranger to security flaws. Researchers at Check Point Security recently discovered a critical vulnerability that has existed as far back as 2003. The vulnerability, known as RedSig, impacts Windows DNS Servers and is so bad it...

Another Critical Vulnerability in Zoom (Security Layers FTW)

The hits just keep on coming for Zoom teleconferencing this year as a new critical vulnerability was disclosed late last week. This is, of course, in addition to the other two critical vulnerabilities that were disclosed last month, as well as the...

Growing Cybersecurity Trends in 2020

  It’s a year that will never be forgotten – the year that will forever go down as one of the “worst years ever.” Sure, that might be a little dramatic, but we can all agree it has been an interesting roller coaster of events. One event we're seeing...

CCPA Compliance and What This Means for You

On June 28th, 2018, California signed a new law called the California consumer privacy act (CCPA), which went into effect on January 1st, 2020. On July 1st, 2020 this law went into its enforcement phase. What this entails is that California's Attorney...

Time’s Up, TikTok: The Hidden Security Risks

I’m sure you’ve all heard of the social media app, TikTok, by now, yeah? Even if you don’t have the app on your phone or you don’t know much about it, you’ve probably heard of others using it or you’ve seen the videos popping up left and right on your...

The Online Youth: How Risk-Aware Are They?

In the past, this article has been more technically focused. For this article, I decided to take a different approach. In the IT Security field, we stay pretty plugged into the technical community. Most of us have our favorite articles or publication...

An Apple a Day Keeps the Hackers Away

In recent weeks, Apple has announced its bold new security move that will have a positive security impact on everyone. This new security move will be changing how we access our browser and will essentially boost security for all its users – which is...

Staying One Step Ahead of Mobile Security Threats

What’s one of the first things you do when you wake up? A high percentage of individuals will answer “check my phone, “or “check my email,” which is inevitably linked to their mobile device anyway. We get it – it’s easy, and it’s way more convenient...

UPnP Devices at Risk from New Vulnerability

Universal Plug and Play (UPnP) has been a security nightmare since its inception over a decade ago. This technology is generally found in consumer-grade networked devices and allows them to discover other UPnP devices automatically on the network to...

A Deeper Look Into “Zero Trust” Security Strategy

What exactly is a Zero Trust security strategy? In general, this strategy simply means that not one person is trusted by default to access your secured network – no matter how high up they may be in the company – secured verification is required 24/7...

1 ...
3 4 5 6 7

 


 

Read More Articles →