Blog

Password

The Best Password Managers and Why you Should Get One

 February 2, 2015

Estimated reading time: 4 minutes

When it comes to web passwords, an average Internet user holds about 26 different accounts, but only has 5 different passwords to access them. This is an alarming statistic as it leaves almost all online accounts of users vulnerable to hackers and password leaks. Now we understand that creating passwords...

6 Easy Steps to Tighten your GMail Security!

 January 13, 2015

Estimated reading time: 3 minutes

We check our Gmail account for personal emails, offers, social media updates, promotions, etc., almost every day. But, reviewing our account’s security setting to ensure that it stays safe against malware and hackers is not something that most of us do. In this post, we will take you through a...

How Secure is Your Password?

 October 31, 2014

Estimated reading time: 2 minutes

If our readers can recollect, we had shared a blog post sometime last year on the common password mistakes people make, and how you can create strong passwords. Well, this post is to see whether our readers have followedour tips. We will be sharing with you all a tool which...

Alert! Beware of Fake Bank Phone Calls

  • 2
    Shares
 September 10, 2014

Estimated reading time: 3 minutes

Over the last few weeks, many readers have shared their dreadful experiences on our blog about losing their money to fake bank phone calls. Scroll down to know how you can protect yourself from such scams. Contents: Real Case Scenario How you can Protect yourself from Such Phone Scams Phishing...

5 Easy Tips to Protect your Smartphone from Theft and Privacy Threats

 July 4, 2014

Estimated reading time: 3 minutes

It is most likely that smartphones are now after air, food, and water. With this thought in mind, here’s a quick combo of some simple tips and tricks to protect your smartphone from privacy threats and loss or theft. Use Your Phone’s Auto-Lock Feature The term ‘lock’ is where security...

Aftereffects of Heartbleed: Have You Changed these Passwords?

 April 25, 2014

Estimated reading time: 2 minutes

Last week we wrote a blog about Heartbleed, the latest security bug that turned up around the world and caused global mayhem. The bug targeted the SSL encryption of web services that used OpenSSL, and this meant pretty much every major web service was affected. Moreover, security researchers subsequently found...

Enterprise Wi-Fi Security: One Password isn’t Enough

 April 9, 2014

Estimated reading time: 3 minutes

The widespread adoption of Wi-Fi network connectivity by enterprises and IT departments worldwide has now exposed enterprise networks to a new dimension of vulnerability in the form of wireless hackers and casual intruders. Wireless connectivity certainly helps organizations connect their devices more efficiently and it also improves their bottom line...

Is Your Password Among the 25 Worst Passwords of 2013?

 January 21, 2014

Estimated reading time: 2 minutes

Yes, you read it right! “123456” has been labelled as the most commonly used and obviously the worst password of 2013. SplashData, a California-based company, comes up with an annual list of the 25 most common passwords used by people online. The list for the year 2013 was topped by...

Here’s a Checklist of Things you shouldn’t Reveal Online

 November 29, 2013

Estimated reading time: 2 minutes

Sharing personal issues with your best buddy, family or an imaginary friend is one thing, and blabbering about it on the Internet is another. A post which you might think is playful, funny or has zero consequences, could be just the missing link for an online fraudster to complete his...

The Underlying Threats to Enterprise Security

 July 10, 2013

Estimated reading time: 3 minutes

When it comes to enterprise security, there’s a lot at stake; consumers, operations, business relationships, work force, brand image, and financial status, to name a few. While the number of enterprise security threats can be in hundreds, in this post, we have discussed some of the most critical ones. Top...