The Verve

Using a QR Code to Log In

Apr 2, 2018 7:51:00 PM / by Chad Sublet posted in Privacy, Business Computing, Data Protection

0 Comments

Passwords are still an incredibly valuable part of security, but it’s becoming quite difficult to maximize network security through passwords alone. Even if you somehow manage to sell the idea of network security to your staff, whether or not they follow through is another thing entirely. It’s critical that you make it as easy as possible for your employees to stay secure, and that’s where scannable QR codes come in.

Read More

Encryption Helps Keep your Smartphone Secure

Mar 30, 2018 6:30:00 PM / by Chad Sublet posted in Security, Privacy, Smartphones

0 Comments

These days everyone has a smartphone; and, they can do some pretty incredible things. One place that the average smartphone may seem to be a little loose is in the arena of data security. Today’s smartphones do, in fact, come with encryption by default, so there is some semblance of device security on every device. What does this mean? We’ll break it down.

Read More

Preventing Identity Theft Should be a Priority, But Do You Know How to Handle It?

Mar 26, 2018 5:25:00 PM / by Chad Sublet posted in Security, Privacy, Identity Theft

0 Comments

The more people use technology, the more they have to deal with the negative aspects of doing so. One of the most prevalent problems users experience today is cybercrime that leads to identity theft. What can you do to prevent this from happening to you?

Read More

Tip of the Week: ‘Secure’ Browsing Doesn’t Mean ‘Private’

Mar 14, 2018 1:19:00 PM / by Chad Sublet posted in Privacy, VPN, Tip of the week

0 Comments

Internet browsers, by in large, provide enough security for the average user to come out unscathed. Nowadays, people deal with many more threats than they once did, but by in large, users stay secure when using today’s most popular browsers. Privacy, however, is a whole different matter.

Read More

Do You Use 2FA? If So, You’re in the Minority

Jan 1, 2018 8:03:00 PM / by Chad Sublet posted in Privacy, Two-Factor Authentication, Network Security

0 Comments

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study unearthed a few surprising takeaways that indicate that 2FA may not be adopted as much as one might expect it to be.

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

see all

Recent Posts