The importance of HTTPS

Mar 7, 2018 1:00:16 PM / by Frontline, LLC posted in 2018march7webandcloud_a, chrome, Encryption, Firefox, http, HTTPS, https everywhere, phishing, security, Web & Cloud, web browsing

0 Comments

Very few internet users understand the meaning of the padlock icon in their web browser’s address bar. It represents HTTPS, a security feature that authenticates websites and protects the information users submit to them. Let’s go over some user-friendly HTTPS best practices to help you surf the web safely.

Read More

Phishers use encrypted sites to scam

Dec 22, 2017 1:00:15 PM / by Frontline, LLC posted in 2017december22security_a, cyber security, Encryption, HTTPS, phishing scam, Security

0 Comments

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security.

Read More

KRACK hacks: What you need to know

Nov 2, 2017 1:00:10 PM / by Frontline, LLC posted in 2017november2security_a, ethernet, HTTPS, krack, patch, public wifi, Security, vpn, wifi, wpa2

0 Comments

You’ve heard of ransomware, denial-of-service attacks, and even phishing, but one hacking technique you may not have heard of is the KRACK exploit. This attack takes advantage of a vulnerability in WiFi networks, which puts any device with a wireless connection at risk. Here’s everything you need to know about KRACK.

Read More

5 simple but manageable security measures

Jul 14, 2016 1:00:13 PM / by Frontline, LLC posted in 2016july14_security_a, cybersecurity, flash player, HTTPS, password manager, Security, Two factor Authentication

0 Comments

Don't be put off by the tech jargon of security experts you find in forums and self-help books. A managed service provider is what you need to break down complex security ideas into easy-to-understand language. However, they generally focus on installing and managing protection software that's often far too complicated to operate without their help. And when that’s the case, what can you do to improve the safety of your business and its data? Keep reading for 5 effective, down-to-earth cybersecurity measures that you not only need to know, but need to put into action

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

see all

Recent Posts