One of the best ways to protect yourself online is by using strong passwords. Yeah, right. You’ve seen the rules before 1. Use long, strong passwords that mix letters, numbers, special characters, and capital letters 2. Avoid using the same password on different websites. But since we have so many to remember, the average is 19 per […]
Security is an evolutionary business rather than a revolutionary one. “Computer security has been around for 25 or 30 years and the threats keep evolving,” Avast CEO Vince Steckler in a video interview with ValueTech. The solutions keep evolving too. “If you go back 20 years ago, the big issue was script kiddies and big public splashes […]
Every year we celebrate Data Privacy Day by thinking about what we post online, what methods we use to connect, and the security of the devices we use. Data Privacy Day (DPD) is an international effort held annually on January 28 to create awareness about the importance of privacy and protecting personal information. Avast knows […]
“SMBs are not just targets of cybercrime, they are its principal target” says a U.S. Security and Exchange Commission report from last fall. In fact, the majority of all targeted cyberattacks last year were directed at SMBs. The New York Times, in its article No Business Too Small to Be Hacked, said that 60% of all online attacks […]
Since the launch of Avast for Business, a free, cloud-managed security solution, in February 2015, organizations worldwide have deployed it to protect more than one million PCs, Macs, and servers from cyberattacks and data breaches. Avast for Business is successful across diverse sectors Avast for Business is extremely popular with Education, Non-profits, Retail, Healthcare, IT […]
The Internet of Things (IoT) join together physical devices that we use every day with information technology. Using internet-connected devices expands our ability to control and monitor in the real world. The IoT is literally changing our lives. The Internet of Things has the potential to fundamentally shift the way we interact with our surroundings. The ability to monitor […]
Two Iran-based attack groups that appear to be connected, Cadelle and Chafer, have been using Backdoor.Cadelspy and Backdoor.Remexi to spy on Iranian individuals and Middle Eastern organizations.Read More