Cybersecurity

Free illustrations of Cybersecurity

What Should You Do to Reduce Risk When Your Mobile Device Goes Missing?

Few things invoke instant panic like a missing smartphone or laptop. These devices hold a good part of our lives. This includes files, personal financials, apps, passwords, pictures, videos, and so much more.  Here is what you should do to reduce risk when your mobile device goes missing. The information they hold is more personal

What Should You Do to Reduce Risk When Your Mobile Device Goes Missing? Read More »

Using a Passkey

Using a Passkey

Recently, Apple announced in May that it would eliminate the password to introduce an alternative, the Passkey. This Passkey will roll out with iOS 16 and macOS Ventura. Developers, enthusiasts, and users worldwide are excited to finally experience this innovative new feature. However, Apple’s highly effective marketing has stirred up some confusion. Most people assume

Using a Passkey Read More »

Registration, Log In, Keyboard, Hand, Write

Which Form of MFA Is the Most Secure? Which Is the Most Convenient?

Credential theft is now at an all-time high and is responsible for more data breaches than any other type of attack.  Let’s explore finding the most secure and convenient MFA. With data and business processes now largely cloud-based, a user’s password is the quickest and easiest way to conduct many different types of dangerous activities.

Which Form of MFA Is the Most Secure? Which Is the Most Convenient? Read More »