We often get computers in for repair or data recovery, which can require passwords to restore access to customer email and other programs. It is not uncommon to hear, "I don't need a password to get into my [insert app/program here]." To which must inevitably explain that all users of the given app or program need a username and password and that thanks to password managers and app preferences, you are often able to stay logged in and rarely, if ever enter your login credenti
You hear about it all the time. People's personal accounts (bank, government, health etc.) get hacked and their information violated, but these platforms usually have two-factor identification and/or security questions to boot. So how do these cyber criminals do it? Personal information is an interesting concept. You may think of it as just your full name, birth date, SIN, driver's license number, that sort of thing. But have a quick think on what those security questions oft
Cookies can be delicious, but also useful if you set your permissions properly! No, we're not talking about the baked goods. In the computer world, cookies refer to small data files that websites use to tailor your experience (but also to track your activity). Briefly, these small data files get stored on your computer when you visit a website and then get read by the site's server. They make it possible for you to login, or remember your username so you don't have to re-ente
Pin or password: Which should you choose and why? A pin uses strictly numbers, whereas a password can contain numbers, letters and symbols. Given a 0-9 keypad, there are 10 billion possible numeric combinations for a pin, but with over 90 possible characters in password you're looking at 59,873,693,923,837,900,000 possible combinations for a password. You can also consider that most PINs are short and passwords tend to be long. So in a nutshell, a password is more secure BUT
With the majority of life happening online these days, data breaches are unsurprisingly on the rise. To combat this, many online platforms have started requiring two-factor authentication. Why? Passwords get hacked all the time. But two-factor authentication requires both a password and physical access to your phone, which is not something a hacker is likely to have. Will you have to do this every time? Not likely, unless you consistently use a shared computer. If it is your
Unfortunately, at this time of year (although it is in no way limited to the holiday season) scams emails are ubiquitous. Really, the only prevention for them is education so here are some tips to arm you and your loved ones with. Computer scams, also known as "phishing" can be distributed via text, emails and websites. They are designed to look like they come from trusted sources. The first thing to be aware of is that thanks to Google, anyone has access to company logos tha
The video conferencing platform Zoom has taken off during the recent COVID-19 pandemic. It is an excellent tool for staying connected with loved ones, taking meetings, hosting webinars. It's success has not gone unnoticed.
While we are highly supportive of the platform, however, we want you to be aware of recent security issues and how to protect yourself from them.
The security breaches involved individuals hacking into and taking over group meetings, speaking over the at
We hear it all the time, "it's just what I'm used to". But using outdated, old operating systems, browsers, programs etc. can come with some serious security risks. Take Internet Explorer for example. IE used to be the go-to for perusing the world wide web but the majority of users ditched it long ago for newer browsers like Chrome and Firefox. Heck, even Microsoft ditched it in favour of Edge. Earlier in the year, Microsoft's security chief put out a blog post warning users
We found a great tip and a funny meme to go with it that we thought we would share! Passwords are always a tough one. If you're like most people, you either write them down, or have one password that you use for everything. Let's have a look at the basic advice for a strong password first: 1. Use a word with at least 12 characters 2. Use capital letters, small letters, symbols and numbers 3. Do not use a name, date, personal information or dictionary word / phrase 4. Change p
Say you've worked hard on a report, or you are sharing sensitive material. Chances are you don't want just anyone altering it, or the wrong people reading it. Do you know how to create read-only files? What about password-protected files? Creating a read-only document is a simple way to make sure no one can edit your document. To save a document as read-only you can do one of two things once you have created your document: 1. Click File --> The Info menu is highlighted by def
For security and privacy reasons, it's a good idea to check what your downloaded apps have access to. For example, it was recently discovered that the Netflix app was accessing physical activity data on mobile devices using a recent version of Android. They claimed to be using the data to see if people were using their streaming services while on the move (walking, biking, running, driving) but did not say how they would be using the data. This is not something one would intu
Are you terrible at remembering passwords? Constantly resetting them? Do you have a book of passwords written down somewhere but you can never seem to find it? Do you dread the day you get those "time to update your password" notifications? You may want to consider a password manager. Password managers are apps that are used to generate, pseudo-randomize and store passwords for you so you don't have to be troubled with coming up with new, secure passwords for every program yo
Not the delicious edibles, but those ubiquitous little bits of data that many simply smile and nod about or are even a bit afraid of. So let's talk about what they are. Cookies are simply data tables that store user preferences. There are two main types of cookies: first-party and third-party. First-party cookies are data tables created by the website that a user is visiting. These cookies are generally user-accepted as they allow you to do things like shop online for multipl