Articles

Latest Articles
Featured image for “Why Everyone Should Use a Password Manager”

Why Everyone Should Use a Password Manager

It’s common cybersecurity advice to use a strong and unique password for each of your accounts. But keeping tabs on…
August 6, 2024
Featured image for “Did You Know Your iPhone Can Remove the Background of Your Photos?”

Did You Know Your iPhone Can Remove the Background of Your Photos?

In the very recent past, if you wanted to remove the background of a picture, you had to master expensive…
August 6, 2024
Featured image for “What Is The Dark Web?”

What Is The Dark Web?

If you read enough news stories about hackers and cyberattacks, you probably notice one term popping up again and again:…
July 30, 2024
Featured image for “Here’s What to Do If Your Credentials Are Compromised”

Here’s What to Do If Your Credentials Are Compromised

No one wants to learn their passwords were found in hack. Unfortunately, it’s all too common of an event: Bad…
July 30, 2024
Featured image for “Watch Out for Wire Transfer Fraud”

Watch Out for Wire Transfer Fraud

Wire transfers are a standard practice for businesses and consumers to exchange funds. But watch out: Wire transfer fraud has risen dramatically, so it…
July 23, 2024
Featured image for “What Are Business Email Compromises?”

What Are Business Email Compromises?

Business Email Compromises (BEC), also known as Email Account Compromises (EAC), pose a significant threat for businesses. These scams primarily target companies…
July 23, 2024
Featured image for “Google Might Spend $23 Billion to Acquire a Cybersecurity Startup”

Google Might Spend $23 Billion to Acquire a Cybersecurity Startup

According to The Wall Street Journal, Google is in “advanced talks” to acquire Wiz, a cybersecurity firm, for $23 billion.…
July 16, 2024
Featured image for “Did You Know Your iPhone Can Identify Plants and Animals?”

Did You Know Your iPhone Can Identify Plants and Animals?

Your iPhone is smart (hence, smartphone) and is capable of many intelligent tasks. In fact, later this year, Apple will…
July 16, 2024
Featured image for “Did You Know Your iPhone Can Read Things to You?”

Did You Know Your iPhone Can Read Things to You?

Technology is supposed to make our lives easier. In many ways, it does without us thinking about it. But it…
July 8, 2024
Featured image for “Try to Keep Your Phone Out of the Sun”

Try to Keep Your Phone Out of the Sun

Smartphones are a part of daily life, so of course they accompany us outside during summer. But with summer, comes…
July 8, 2024

Your Favorite Apps and Sites Might Be at Risk

Cybersecurity affects every facet of digital technology. If a device can connect to the internet, it can pose a risk if not properly protected. So it is with even popular apps and sites like Twitter, iCloud, and Steam; these services...
December 13, 2021

Apple iOS 15.2 Introduces New ‘App Privacy Report’

Apple released iOS 15.2 for iPhones on Monday, Dec. 13. The new update adds over a dozen new features and changes to iOS, but one feature in particular is quite useful for identifying any apps on your phone that are...
December 13, 2021

Mozilla Is Shutting Down Lockwise

Mozilla's Firefox Lockwise is a popular password manager that is, unfortunately, going away soon. The company announced it would be shutting down Lockwise effective Dec. 13, 2021. The app will be removed from the iOS App Store and Google Play...
December 6, 2021

FindTime Can Help You Schedule a Meeting That Works for Everyone

When you're trying to schedule a big meeting, it can be tough to find a time that works for everyone's conflicting calendars. If you often see yourself struggling to put these complicated meetings together, you'd likely benefit from the Outlook...
December 6, 2021

You Should Be Using Your iPhone’s Built-In Authenticator

While we highly encourage you to use two-factor authentication, not all 2FA is equal. 2FA that uses SMS is certainly better than no protection, but it doesn't offer the most protection. Instead, you should use an authentication app, such as...
October 18, 2021

Is Your Business Following These Essential Best Practices Right Now?

Whenever your technology is involved in your business processes, it is important that you abide by best practices to see the most effective results. Let’s run through the most effective practices that you should reinforce in your operations. Emphasize Security...
October 15, 2021

3 Reasons to Consider a Private Cloud Solution

The cloud is a great opportunity for businesses to increase accessibility of data and enhance productivity, especially while remote, but for those who do not know how to approach it, the cloud can be intimidating. Today, we are going to...
October 7, 2021

Vulnerabilities Found Inside Azure-Linked Managed Database Service

It’s not unheard of for some threats to remain undiscovered for months or even years, as is the case with a particularly nasty one in the Microsoft Azure database system. This exploit, discovered by cloud security provider Wiz, is built...
October 4, 2021

How to Make macOS Sound Effects Play Through AirPods

Sending and receiving messages, systems alerts, and more — Apple sound effects are truly ubiquitous. When using AirPods with your iPhone or iPad, those sound effects play through your earbuds just like all other sounds. But on Mac, sometimes those...
March 7, 2021

Change Your Passwords With This Strategy

What makes a quality password? Something that isn't easy to guess? Something that doesn't contain personal information? Those are good answers, but they're only a start. You see, in the past, we've been taught to think of individual people trying...
December 7, 2020
1 25 26 27



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.