Sometimes cyber criminals do such a good job camouflaging their ploys to steal consumers’ personal information that you might not recognize that the site you just entered your password on isn’t a legitimate login page. 266 more words
Tags » Password Protection
AKA: How to Create Unique Passwords and Protect Them!
Back in October, we briefly hit on ways to keep your passwords safe. We believe that unique passwords are the most important tool you can use when it comes to Cyber Security, so we’d like to go a little bit more in-depth on the subject. 608 more words
A lot has been written about mobile penetration rates in South Africa. From feature phones and smartphones, to those unwieldy-looking hybrid devices that make people look like they have a tablet glued to their ears (AKA phablets), everybody is online wherever they go. 595 more words
Hmmm… I currently use 2-step password verification with my Google and Microsoft Live accounts. I like the idea it is a more secure process of locking down my accounts from intruders; however, the downside of this is you need to have this set up with your smartphone in order for the verification process to work. 154 more words