Tech companies wrestle with keeping users safe

Facebook, Uber and Telegram have all this week faced challenges to user safety – we look at those challenges and what we can learn from them.

24 Mar 2018 min read

Key vulnerabilities: devices and people

Cybercrime goes after these two primary attack surfaces of SMBs - Devices & People. These key vulnerabilities are critical in keeping your business secure.

22 Mar 2018 min read

Convenience vs. privacy: the Facebook situation

Here are 4 tips to protect your data from being shared on Facebook

22 Mar 2018 min read

Consumers can lead the way in pressuring tech companies to respect security and democracy

We are now a few months into 2018 and the scope of malicious digital activities is already expanding.

21 Mar 2018 min read

The essential guide to cleaning & speeding up your Mac

Macs don’t ever slow down, don’t ever crash, and sure as rain don’t ever run out of space. Right? Wrong.

20 Mar 2018 min read

When information leaks

A vulnerability and a victory for data protection authorities are a good reminder about what can happen when data isn’t kept safe.

19 Mar 2018 min read

Five endpoint threats affecting small businesses

This cybersecurity guide aims to help small business owners protect their companies against endpoint threats by arming them with appropriate knowledge. Below is a step-by-step introduction to cybercrime followed by our list of the top five endpoint threats affecting small businesses.

19 Mar 2018 min read

Avast Named a CRN Coolest Endpoint Security Provider

Avast Business portfolio recognized for meeting SMB security needs

19 Mar 2018 min read

New Monero mining malware discovered in Google Play

Avast researchers detect covert malware affecting multiple apps

15 Mar 2018 min read

Is your smart home a secure home?

IoT devices may make our lives more convenient, but they also make our homes more vulnerable.

14 Mar 2018 min read

Greedy cybercriminals host malware on GitHub

Cryptocurrency mining malware, which also installs a malicious Chrome extension, hosted on GitHub for anyone to download.

13 Mar 2018 min read

How to manage endpoint protection without an IT department

How can you protect your small business from cyberattacks without an IT team? Read our step-by-step guide.

12 Mar 2018 min read

How to protect a small business from hackers

Make sure that you’re protecting your business against cyber threats

12 Mar 2018 min read
--> -->