Home » online protection » Page 6

online protection

6 Online Security Essentials for any Company to Consider

  • News
  • 6 min read

Controlling risk is an important aspect of any online business. The risk of going digital with some of your data is one that nearly every company has taken on, but how many of them have looked at the security essentials that will help them manage that risk?

As a primer on these security essentials, read on for 6 that can’t be missing from any digital data security plan.Read More »6 Online Security Essentials for any Company to Consider

BYOD and Mobile Device Risks for your Business

The movement for BYOD, and the flexibility being afforded to workers to use mobile devices of their own choosing, can be freeing for some. For others, such as the cybersecurity conscious, it can be a bit of a nightmare of all new mobile device risks to deal with.

Common precautions that were once on every device in your network may not be taken anymore. Here are a few rules you should institute for BYOD devices so that you can minimise the risks associated with allowing mobile devices into your workflow.Read More »BYOD and Mobile Device Risks for your Business

A Beginners Guide to Net Neutrality

  • News
  • 5 min read

With the Internet packed full of net neutrality debate ahead of tomorrow’s (Feb 26th 2015) vote on net neutrality in the USA, it’s important for those who don’t know to get themselves up to speed.

To get outside of the Internet and show you a real world simile: Imagine if your TV only worked with one cable provider, and that you have no option based on your TV which shows you could watch. Right now, you can buy any TV, plug it into the wall, and choose how you want to connect – cable, satellite, even bunny ears, as well as which provider will be selling you this service.

When it comes to the Internet, neutrality has a huge impact on how you can get information in a timely manner. This applies both to how quickly you can access that data, and how easy it is to find.Read More »A Beginners Guide to Net Neutrality

The Ongoing Controversy Around Hide My Ass Logging

The subject of logging and VPNs is an important one to pay attention to when you’re considering how protected you want to be. A VPN provider which continually comes up in discussions around this subject is Hide My Ass, our number two ranked provider.

This is because Hide My Ass logging is a bone that the hacker community likes to pick at every chance they get. I’m going to look at why we still rank Hide My Ass at number 2 despite their logging policy, and expand on the issues some face with this provider.Read More »The Ongoing Controversy Around Hide My Ass Logging

Cybersecurity for your Family and Home

The next life skill that needs to be taught to kids at a young age is cybersecurity for the home, and for the whole family. When I was a teenager and the Internet first came to my city, the only cybersecurity for the home concerns were not meeting strangers you met online, and not giving out passwords.

Things have changed since then. Hackers are more sophisticated and better equipped. And the amount of data at stake has reached exponential levels. You can do plenty to increase your home cybersecurity, and keep your family safer from identity theft and a host of other malicious online attacks. Read More »Cybersecurity for your Family and Home

The EFF, VPNs, and Encrypting your Computer Data

The question of who owns your private computer data should have an obvious answer: you own your data. The reality, however, is quite different. There are countless websites tracking you and taking your data without your knowledge. There are hackers who are trying everyday to own your data. And lastly, there is the police who believe that they can take your computer data whenever they want – even when you’re completely innocent and not under investigation!

Encrypting your computer data is a way to take ownership of your data. But is it always good for you? Is some of it bad, even illegal? And who are the parties involved in all this? All that, and more, in this article!Read More »The EFF, VPNs, and Encrypting your Computer Data

5 Online Security Goals for your Business this Year

I’m sure you noticed this, but there were a lot of security breaches in 2014. You can read a list of the worst breaches here, but I’m sure you know of at least a few just from general media. Your online security goals need to be stepped up if you hope to protect your business. The odds are good that cyber criminals just haven’t bothered targeting if you weren’t hacked and don’t have these plans in place!Read More »5 Online Security Goals for your Business this Year

How to Be Anonymous Online Using Safari & A VPN

Using a VPN is a big step to take if you want to be anonymous online. It will mask all of your activity, hide your IP address, encrypt your data, and a host of other things that we’ve talked about all over the Best VPN Provider blog.

Unfortunately, not everyone has used a VPN from the moment they first turned on their computer, and this can lead to companies still tracking some information about you. I’m going to talk directly to all the Mac and Safari users out there in this article. Use comparable tools and commands for your browser if you don’t use Safari, but consider a switch to the ultra-secure Safari in the future.Read More »How to Be Anonymous Online Using Safari & A VPN