TechGuard Blog


Best Practices to Keep Your “Smart” Home Security Cameras Secure

"Home is where the heart is," a saying almost universally accepted no matter where you’re from, but why is this? Is it your dog, cat, fridge full of food, big screen TV, or comfy recliner? I argue that home is where the heart is because of privacy. There...

The Cyber Dangers of Remote Learning

As if e-learning doesn’t already come with a heaping mound of obstacles for parents, teachers, and children – we must also be extremely cautious and prepared for a cyber-related attack as our educational leaders and kids are doing their best to fit in...

Remote Work Security Checklist

Whether you've been working remotely for a while or just recently began navigating the tricky waters of Zoom meetings and home-office setups, it's always a good time to check and double-check that you're being as secure as possible. Remote workers create...

This Golden Rule Will Make You (Almost) Scam-Proof

Social engineering attacks and scams are part of daily life in this technology age, and they are here to stay whether you like it or not. This is evident in the mandatory training surrounding social engineering that most companies require their employees...

Netflix Users Beware – Coronavirus Opens the Floodgates for Scamming

The coronavirus pandemic has resulted in several chain reactions, one of which, unsurprisingly, involves the surge in Netflix subscribers during the lockdown. Quarter 2 saw the streaming service boast a record-breaking 10.1 million new subscribers, a...

What We Can Learn From Twitter's Massive Breach

Every day, hackers are seeking to attack targets that will reap the most reward. Oftentimes, hackers will target small companies that do not have the resources to fund a cybersecurity department. Other hackers will spend time looking for vulnerable...

These 5 Cybersecurity Topics Could Save Your Business

Many companies fail to understand the importance of having a well-rounded cybersecurity awareness training program. Some companies think that having a one-time phishing course for new employees will be sufficient in preventing cyberattacks. Other...

Our Message to You: Stop Using Facebook Messenger

If you’re an avid Facebook user, you more than likely use their convenient Messenger app as well. If that's the case, you may want to begin thinking of alternatives. Unfortunately, their platform is lacking serious security measures that may cost you in...

How to Prepare in the Case of Another COVID Induced Shutdown

Preparing for another shutdown Surely you've heard of Severe Acute Respiratory Syndrome Coronavirus 2? What about SARS-CoV-2 or novel coronavirus-2019? COVID-19? Regardless of what you call it, we were all affected by it in March of 2020 when the US was...

Windows Security Flaw gets Perfect Score

Microsoft Windows is no stranger to security flaws. Researchers at Check Point Security recently discovered a critical vulnerability that has existed as far back as 2003. The vulnerability, known as RedSig, impacts Windows DNS Servers and is so bad it...

Another Critical Vulnerability in Zoom (Security Layers FTW)

The hits just keep on coming for Zoom teleconferencing this year as a new critical vulnerability was disclosed late last week. This is, of course, in addition to the other two critical vulnerabilities that were disclosed last month, as well as the...

Growing Cybersecurity Trends in 2020

  It’s a year that will never be forgotten – the year that will forever go down as one of the “worst years ever.” Sure, that might be a little dramatic, but we can all agree it has been an interesting roller coaster of events. One event we're seeing is...

1 ...
6 7 8 9 10

 


 

Read More Articles →