Protect your Mac from security threats

Feb 23, 2018 1:00:12 PM / by Frontline, LLC posted in 2018february23apple_a, Apple, Encryption, firewall, firmware, Mac, password, privacy, security, server

0 Comments

Mac users follow certain steps to maintain privacy and protect company data. But if you're too busy or short on resources, you might place security lower on your to-do list. Whatever your reason, the threat is real and you need to take steps to protect yourself.

Read More

How to secure your IoT devices

Jul 24, 2017 1:00:04 PM / by Frontline, LLC posted in 2017july24hardware_a, firmware, Hardware, internet of things, iot, network, password, security, UPnP

0 Comments

More firms are using the Internet of Things (IoT) to create new business opportunities. For instance, companies that install smart sensors can automate data entry and monitor their inventory. However, if left unsecured, IoT devices also give hackers an opportunity to breach your network. In order to keep attackers at bay, we advise you take the following precautions with your IoT devices.

Read More

Wikileaks details router vulnerabilities

Jun 27, 2017 1:00:45 PM / by Frontline, LLC posted in 2017june27security_a, cia, firmware, routers, Security, security, wannacry, wikileaks, wireless networks

0 Comments

When we write about how antivirus software isn’t enough to keep you safe from malware, it’s not just scare tactics. There are so many ways hackers can break into your system that antivirus solutions will never catch. For a real-world example, look no further than the router exploit kit recently leaked from the CIA.

Read More

Firmware: the threat most users overlook

Apr 18, 2017 1:00:10 PM / by Frontline, LLC posted in 2017april18hardware_a, cyber security, firmware, Hardware, managed services, routers

0 Comments

For decades, one of the most foundational principles of cyber security has remained the same: Always update and patch your software. But for most people, hardware is exempt from this process. They think of hardware as nothing more than a vessel for software to occupy -- and that’s totally incorrect. Read on to learn more about this oft-neglected aspect of IT security.

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

see all

Recent Posts