Articles

Latest Articles
Featured image for “Boeing Investigating Possible Ransomware by LockBit Group”

Boeing Investigating Possible Ransomware by LockBit Group

A ransomware attack can happen to any company at any time. No matter how large or small your company may…
October 31, 2023
Featured image for “CISA Warns of Rise in Ransomware Attacks During Holidays and Long Weekends”

CISA Warns of Rise in Ransomware Attacks During Holidays and Long Weekends

Ransomware attacks, like all cyberattacks, can happen at any time, which is why it is critical to always be on…
October 31, 2023
Featured image for “These Google Ads Are Actually Malicious”

These Google Ads Are Actually Malicious

Google ads can be a mild annoyance, or useful, if relevant to your search or general interests. However, occasionally, they…
October 24, 2023
Featured image for “Okta Customer Data Exposed in Security Breach”

Okta Customer Data Exposed in Security Breach

Okta, a popular identity services provider, acknowledged a security breach that allowed bad actors to access its support case management…
October 24, 2023
Featured image for “You Don’t Need to Tell Apps and Websites Exactly Where You Are”

You Don’t Need to Tell Apps and Websites Exactly Where You Are

It’s no secret smartphones have access to and actively use our locations. After all, navigation apps like Google Maps would…
October 17, 2023
Featured image for “Don’t Store Your Company Passwords in a Plain Text File”

Don’t Store Your Company Passwords in a Plain Text File

There are plenty of “rules” for keeping your various accounts safe: Use a strong password for each of your accounts;…
October 17, 2023
Featured image for “Vietnamese Government Agents Attempted to Infect U.S. Congressmen’s iPhones”

Vietnamese Government Agents Attempted to Infect U.S. Congressmen’s iPhones

We all need to be on the lookout for hacking, but some of us need to be more careful than…
October 10, 2023
Featured image for “Password Protect Your Microsoft Office Files to Secure Your Work”

Password Protect Your Microsoft Office Files to Secure Your Work

Your work belongs to you and your company, not bad actors, hackers, or others who want to take it for…
October 10, 2023
Featured image for “The NSA Is Creating an Artificial Intelligence Security Center”

The NSA Is Creating an Artificial Intelligence Security Center

As AI—specifically generative AI—continues to capture the attention and imagination of us all, it becomes more evident than ever that…
October 3, 2023
Featured image for “Thinking About AI’s Role in Election Security”

Thinking About AI’s Role in Election Security

One of the biggest stories in cybersecurity over the last decade or so has been election interference. The internet empowers…
October 3, 2023

Mozilla Is Shutting Down Lockwise

Mozilla's Firefox Lockwise is a popular password manager that is, unfortunately, going away soon. The company announced it would be shutting down Lockwise effective Dec. 13, 2021. The app will be removed from the iOS App Store and Google Play...
December 6, 2021

FindTime Can Help You Schedule a Meeting That Works for Everyone

When you're trying to schedule a big meeting, it can be tough to find a time that works for everyone's conflicting calendars. If you often see yourself struggling to put these complicated meetings together, you'd likely benefit from the Outlook...
December 6, 2021

You Should Be Using Your iPhone’s Built-In Authenticator

While we highly encourage you to use two-factor authentication, not all 2FA is equal. 2FA that uses SMS is certainly better than no protection, but it doesn't offer the most protection. Instead, you should use an authentication app, such as...
October 18, 2021

Is Your Business Following These Essential Best Practices Right Now?

Whenever your technology is involved in your business processes, it is important that you abide by best practices to see the most effective results. Let’s run through the most effective practices that you should reinforce in your operations. Emphasize Security...
October 15, 2021

3 Reasons to Consider a Private Cloud Solution

The cloud is a great opportunity for businesses to increase accessibility of data and enhance productivity, especially while remote, but for those who do not know how to approach it, the cloud can be intimidating. Today, we are going to...
October 7, 2021

Vulnerabilities Found Inside Azure-Linked Managed Database Service

It’s not unheard of for some threats to remain undiscovered for months or even years, as is the case with a particularly nasty one in the Microsoft Azure database system. This exploit, discovered by cloud security provider Wiz, is built...
October 4, 2021

Tips to Speed Up Your Wi-Fi

We take Wi-Fi for granted. It empowers us to connect to the internet anywhere in our homes, without worrying about plugging into a wired connection. That said, just because you’re on Wi-Fi, doesn’t mean your connection is ideal.  When taking a...
July 25, 2021

How to Make macOS Sound Effects Play Through AirPods

Sending and receiving messages, systems alerts, and more — Apple sound effects are truly ubiquitous. When using AirPods with your iPhone or iPad, those sound effects play through your earbuds just like all other sounds. But on Mac, sometimes those...
March 7, 2021

Change Your Passwords With This Strategy

What makes a quality password? Something that isn't easy to guess? Something that doesn't contain personal information? Those are good answers, but they're only a start. You see, in the past, we've been taught to think of individual people trying...
December 7, 2020
1 18 19 20



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.