It’s a five out of five for ESET Endpoint Security

As threats continually evolve, so too must security.  Today, businesses need solutions that can stand up to the targeted and complex methods hackers deploy, if they are to prevent the very real prospect of falling victim to a data breach. Yet while many IT security companies claim they can deal with the changing threat landscape, … More It’s a five out of five for ESET Endpoint Security

Avoid getting lost in encryption with these easy steps

Encryption can be the answer to many data security issues faced by small and medium businesses. Not only can it protect sensitive information from unauthorized use and minimize the risks arising from data breaches, implementing this technology can also represent another step towards compliance with legislation, especially with respect to the General Data Protection Regulation (GDPR). But in … More Avoid getting lost in encryption with these easy steps

Having “the talk” with parents — the tech talk, that is

Reviewing a lease, preparing a favorite recipe, applying for a loan … these are all things a typical college student might ask parents how to do. But these days, students are more likely to turn to a quick internet search for answers to just about everything. Parents, however, still tend to depend on their children … More Having “the talk” with parents — the tech talk, that is

iOS VPN apps removed from Apple’s Chinese App Store

Regular readers of We Live Security will know that we have long been proponents of internet users protecting their privacy by installing a VPN on their computers, tablets, and smartphones. Don’t know what a VPN is? Watch this video from ESET. Ok, so hopefully we’re all up to speed and understand the importance of running a VPN. But depending … More iOS VPN apps removed from Apple’s Chinese App Store

Are smartphones threatening the security of our IoT devices?

By 2020, the number of Internet of Things devices is estimated to surpass 20 billion. From smart fridges to coffee makers and Barbie dolls, connected things will soon fill our households. Many of these devices are, and will continue to be, accessed via our smartphones. While this is very convenient for users, there are weaknesses in smartphone security that can be exploited to turn … More Are smartphones threatening the security of our IoT devices?