Cyber safety

Best Practices for Enterprise IT Security

To boost brand image and increase productivity, more and more enterprise sectors are exploiting avenues such as cloud…

Why SMEs Need to get Serious about their IT Security?

What’s common between most small and medium enterprises? It is a false sense of IT security that they…

Lost your Laptop? Let Quick Heal Track it for you!

What are the odds of getting back a lost or a stolen laptop? Sure, there are many types…

Whatsapp Hoax (fake) Messages Doing the Rounds Again

Today one of my colleagues received a message on WhatsApp that read: “Hello, I. Am riya director of…

Opinion Time – Vote

The recent leak about USA’s secret monitoring program PRISM has received mixed reactions.  For those who have missed…

Apps that every parent should know about

Beginning of the school year is a delicate time for children and youth. If academic expectations are not…

Work from Home Scam

Yet another kind of social media scam that has come under the radar of security officials is the…

Things You Should Keep off the Table of Facebook

As a continuation to our previous post, where we had discussed the type of information one should not…

How Much Should You Reveal on Facebook?

Oh my God, you do not have a Facebook account? What kind of medieval world do you live…

How do Cyber Criminals get away with Social Engineering Tricks – Infographic

In an earlier post, we had discussed various tricks that cyber criminals use to get what they want….