Updated on
December 15th, 2016
by Quertime Writer in Cyber Security
With the recent hacking debacles surrounding the use of cloud storage, there has been a lot of questions regarding whether storing data in the cloud is secure. The answer to this question is still a big YES, but only if you know how to secure your cloud data properly.
In this article, we are going to review some of the best tips you can use to help secure your cloud data even further. Read more…
Updated on
December 15th, 2016
by Quertime Writer in Cyber Security
When it comes to securing your Internet activities, protecting your personal information such as passwords and account numbers, and preventing hackers from gaining access to documents and files you would rather not make public, Virtual Private Networks (VPNs) are a modern day necessity.
Yet with the hundreds, or even thousands, of different VPNs to choose from, how can you be sure you are choosing the right one? Read more…
Updated on
December 15th, 2016
by Quertime Writer in Cyber Security
Google has been considered the best tool for spying, with the complete devices for spy needs to help achieve a spymaster’s dream. It has been revealed time and again that there are truths emanating from Google which implies that indeed there are several instances that it had been used as a platform to a hacking or spying activity whether privately, publicly or in government entities which may include political activities for some prominent personalities.
The Chairman of Google, Mr. Eric Schmidt’s had been notably quoted as “if you have something you don’t want anyone to know, maybe you shouldn’t be doing it,” thing is just as synonymous to “do not use Google products and services, if you don’t want to be spied on.” Therefore, there is a hint of truth in these words, which can somewhat be alarming. Read more…
Updated on
February 15th, 2019
by Quertime Team in Cyber Security
Password plays a very important security role to prevent any unauthorized access to your computer and online accounts such as Facebook, Gmail and Internet banking accounts.Many people tend to use their own names, date of births, or even a string of easy-to-guess numbers such as 123456 as their passwords. If you use this kind of password, chances are your online accounts are highly vulnerable to hacking. To prevent this happening, we strongly recommend you to check out our previous post titled “40 most hacked passwords you shouldn’t use” to prevent yourself from becoming a victim of cyber criminals.
So, how to create a highly secure but easy to remember password? Below we’ve rounded up a list of online password generators. These free tools enable you to easily create strong and memorable password with just a single mouse click. Most of them allow you to specify password criteria depending on the level of complexity you want. Read more…
Updated on
December 15th, 2016
by Quertime Writer in Cyber Security
BYOD: Bring Your Own Device – this phenomena in today’s IT business culture is on the rise and not likely to abate anytime soon. By most measures many IT managers have embraced (at least to some extent, anyway) employee use of their own devices at work for a number of reasons, including saving the company money on expensive hardware expenditures, increasing employee morale, and as one CIO put it, BYOD being “a great way to recruit and retain young talent.”
This paradigm shift seems especially prevalent in IT start-up enterprises. CIOs, managers and other decision makers within these new organizations may be more adept at addressing the phenomena and all it entails provided they are forthright in their assessment and understanding of it. Read more…
Updated on
December 15th, 2016
by Quertime Team in Cyber Security
These days, hacking is becoming a real issue. As a regular Internet user, we should do our best to make sure our online accounts are safe. Having accounts hacked can be dangerous, If someone gains access to your online account they can do whatever they like. Just imagine that if the password of your online banking account falls into the hand of cyber criminal, all your savings will be gone in seconds. Certainly you will never want this happens in your life.
To prevent this online security threat, below are some useful tips to help you protect your passwords effectively. Don’t miss it! Read more…
Updated on
December 15th, 2016
by Quertime Team in Cyber Security
Have you ever wondered what is the worst password you can possibly choose? It’s “password”! “Password” ranks first on SplashData, the password management solution provider’s annual list of worst internet passwords based on millions of stolen passwords posted online by hackers. In the list, you’ll find that many passwords are sequential series of numbers and letters on the keyboard such as 123456 (ranked no.2) and qwerty (ranked no.4).
Some common names like “Ashley” and “Michael” and sports names such as “baseball” and “football” are also commonly used as easy-to-remember passwords. However what made me surprise was that “monkey” ranked no.6 on the list which is pretty hard to explain. Here’s the Top 40 most commonly hacked passwords you should never use. Read more…
Updated on
March 14th, 2017
by Quertime Team in Cyber Security
Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Scammers send a mass email to every address they can find. Typically the email will appear to come from a bank or financial institution, asking you to update your information for some reasons and providing a link that you can click to do so. Unfortunately, the link provided does not take you to the bank’s website. Instead, you’ll be submitting your information to a website run by the scammers.
Phishing scams are now a part of everyday life, we must always be careful of every sites we visit and link we click so that we don’t fall victim to phishing. Today we would like to share with you 3 useful ways to detect, prevent and stop phishing scams. Hope you can find them useful. Read more…