Written by: Jay H. Zoom has announced that end-to-end encryption (E2EE) is finally available for free and paid users globally. The feature is available as a technical preview for thirty days, during which Zoom is soliciting feedback from users. E2EE is available on Zoom desktop client version 5.4.0 for Mac and PC, the Zoom Android and Apple apps, and Zoom
Written by: Jay H. A VPN (virtual private network) is a technology used to increase your privacy and security online. It works by connecting your computer to a server run by a VPN provider using an encrypted connection. Then, the data transferred between you and the server is kept safe from hackers. Using a VPN strengthens your online protection. Since
Written by: Jay H. What would happen if your computer’s files were suddenly deleted? Would you be able to recover them from a backup? If not, you seriously need to consider creating a backup of your files, especially if you have invaluable data you cannot afford to lose. We cannot express the importance of data backups enough. Threats Are Everywhere
Written by: Jay H. Digital privacy is a major hot topic nowadays. Your digital presence is tracked and logged with every click, so it might feel invasive when ads seem to know too much about you. However, there are ways to maintain a degree of privacy if you prefer to avoid being tracked online. Clear Your Browsing Data Wiping your
Written by: Jay H. Keeping your data secure is more critical now than ever. With hackers and scammers continually looking for ways to gain access to your personal information, you must take steps to protect yourself. An easy and effective way to secure your data is by enabling two-factor authentication (2FA). Find out what two-factor authentication is and how it
Written by: Jay H. What Is Ransomware? Cybercriminals use several measures to exploit people for money, and ransomware is one of them. Ransomware is a form of malware that denies users access to their files through encryption until the attacker receives ransom payment. Once the user pays the ransom, there is no guarantee that the victim will recover their files.
Written by: Jay H. Three-quarters of millennials are using the same password for more than ten different accounts, apps, and devices, according to a report conducted by Clario and OnePoll. Alarmingly, some even admitted they were using the same password for over fifty different accounts! These acts of password recklessness are putting millennials at risk. The concerning survey sheds light
Written By: Jay H. Ransomware and business email compromise are the leading cybersecurity threats to Canadian organizations, according to a new report. In its annual Canadian Cybersecurity Trends Study, law firm Blakes notes tactics that rely on human error are on the rise. “We have observed that more sophisticated ransomware variants are emerging at an accelerated rate,†said the report’s
Written by: Jay H. According to a report released by security vendor Positive Technologies, cybercrime is on the rise, and targeted attacks are the leading cybersecurity incidents. Using data collected last year, the organization found that targeted attacks made up 60 percent of incidents, a 5 percent rise from 2018. The top sectors targeted were government, industry, healthcare, science, education,
Written by: Jay H. Amongst the chaos created by the coronavirus, scammers are scheming ways to capitalize on peoples’ fears. According to security firm Barracuda Networks, the amount of coronavirus-related email phishing attacks has steadily increased since January. Also, there has been an unprecedented spike since the end of February, with a 667 percent increase in coronavirus email phishing. From