Work from home: Videoconferencing with security in mind

With COVID-19 concerns canceling face-to-face meetings, be aware of the security risks of videoconferencing and how to easily overcome them. At the time of writing one-third of the world’s population is enduring restricted movement to stem the spread of COVID-19. The lockdown has driven huge swaths of the working population to become remote workers, many for … More Work from home: Videoconferencing with security in mind

Keep calm and carry on working (remotely)

How can employees stay motivated and productive while teleworking during the COVID-19 crisis? As more of the world’s population than ever before take their equipment home to begin working remotely, the challenge is for team leaders to ensure their team members remain productive, motivated and engaged, and avoid the issues of isolation. Last year, Buffer, a company … More Keep calm and carry on working (remotely)

Work from home: How to set up a VPN

As the COVID-19 pandemic has many organizations switching employees to remote work, a virtual private network is essential for countering the increased security risks. If you’re newly working from home because of the COVID-19 outbreak, you probably have to learn some new tools and tricks very quickly now. Here we look at virtual private network (VPN) technology. … More Work from home: How to set up a VPN

5 tips for a cybersecure home office experience

If the coronavirus has you working from home for the next few weeks, don’t forget about cybersecurity best practices that can help defend against a cyberattack. Along with the coronavirus upsurge, new “opportunities” have blossomed for cybercriminals in at least two ways. First, the term “coronavirus” is reaching unprecedented levels of search volumes, meaning that malicious … More 5 tips for a cybersecure home office experience

What exactly is a file-less malware attack and how could it affect your business?

File-less malware attacks leave little trace, which makes them all the more threatening. A file-less malware attack doesn’t even need to install software on a victim’s machine and is instead based on an attacker taking control of something already installed on your computer. A file-less malware attack often latches onto a built-in component of Windows … More What exactly is a file-less malware attack and how could it affect your business?