Are you tired of trying to remember all of your passwords? I certainly am, especially as I login to hundreds of sites. But don’t pity me — I have no idea what any of my 326 passwords actually are. And that is a good thing, because I have been using&nb…
Maybe you’re launching a new business, or maybe you’re updating the equipment in your office. Either way, selecting the right computer for your needs is crucial – especially if you’re buying in bulk. So what’s it going to be: Mac or PC?
With smartphones, tablets, laptops, and smart devices becoming a mainstay in everyday life, the world has become more mobile and connected than ever. Almost every device can connect to the internet from anywhere. While this is undoubtedly convenient, t…
Nearly two weeks after getting shut down by a ransomware attack, navigation and fitness giant Garmin’s systems are getting back to normal. As of late last week, users’ dashboards and workout data were up and running. Functionality for other services li…
What is MFA (and why should you care)?
In a nutshell, multi-factor authentication (MFA) means using something else besides your password to gain access to your account. There are many ways to do this – some, such as texting a one-time PIN to your phon…
From his beachside home in gorgeous Croatia, Chess Grandmaster and Avast Security Ambassador Garry Kasparov brings us “Garry on Lockdown,” a digital series that delves into the tech that can make our lives easier both during and after the pandemic. If …
IBM published its annual study on data breaches, which looks at causes, costs of damages, and trends on a global scale. This year’s report found that data breaches cost the victimized organization an average of $3.86M in damages. Healthcare was found t…
We’re excited to announce the Public Beta of our newest service in the Avast Business Multi-tenant Management Console – the Remote Control.
End user license agreements (EULAs), and other contracts between consumers and vendors such as terms and conditions (T&Cs), privacy policies, and acceptable use policies, are a ubiquitous part of life online. We need to agree to a EULA, and often a…
As business becomes ever more dependent on the effective use of technology, it can feel like the threat of becoming the victim of a cyberattack is almost inevitable, especially with threats from cybercriminals on the rise. Attacks against UK businesses…