Articles

Latest Articles
Featured image for “Google Is Making Your Android Phone More Secure”

Google Is Making Your Android Phone More Secure

If you use an Android phone for work, there are plenty of steps you can take to keep your sensitive…
May 21, 2024
Featured image for “This Apple Feature Can Ruin Your Business Calls”

This Apple Feature Can Ruin Your Business Calls

A couple weeks ago, we highlighted Voice Isolation, a feature on your iPhone that can enhance your voice when making…
May 21, 2024
Featured image for “Recommendations for Passwords on National Password Day”

Recommendations for Passwords on National Password Day

Earlier this month was National Password Day, and for a long time, the common attitude towards passwords was this: Make…
May 14, 2024
Featured image for “Apple’s Latest Update for iPhone Patches 15 Security Vulnerabilities”

Apple’s Latest Update for iPhone Patches 15 Security Vulnerabilities

Apple’s latest update for iPhones, iOS 17.5, adds a few new features for your smartphone. But aside from these fresh…
May 14, 2024
Featured image for “Hackers Break Into Dropbox Sign, Stealing Customer Information”

Hackers Break Into Dropbox Sign, Stealing Customer Information

As companies employ new tactics to defend themselves against cyberattacks, hackers continue to find a way in. So it is…
May 7, 2024
Featured image for “How “Voice Isolation” Can Make Your iPhone Calls Clearer”

How “Voice Isolation” Can Make Your iPhone Calls Clearer

Phone calls are an essential part of business life, but they aren’t always easy. There are many times that it’s…
May 7, 2024
Featured image for “Microsoft May Be Trying to Earn Back Trust in Cybersecurity”

Microsoft May Be Trying to Earn Back Trust in Cybersecurity

On an earnings call last week, Satya Nadella, CEO of Microsoft, told investors and analysts that the company would be…
April 30, 2024
Featured image for “Email Isn’t Always Secure (but It Can Be)”

Email Isn’t Always Secure (but It Can Be)

Usually, it’s good advice to keep sensitive and private information away from email. If you need to share confidential business…
April 30, 2024
Featured image for “You Should Check Which Apps on Your Smartphone Are Using Your Location”

You Should Check Which Apps on Your Smartphone Are Using Your Location

Thirty years ago, no one would believe we’d all voluntarily carry around devices that could be used to track our…
April 23, 2024
Featured image for “Protect Your Privacy By Forwarding Your Emails Through a Decoy Account”

Protect Your Privacy By Forwarding Your Emails Through a Decoy Account

One of the reasons our inboxes are full of spam is because our email addresses are all over the internet.…
April 23, 2024

Cyberattack Takes Lurie Children’s Hospital’s Network Offline

As a general rule of thumb, hackers—particularly those that engage in large scale cyberattacks—don't have much of a moral compass. They'll attack any business, large or small, if it means they'll make some money in the process. However, it's still...
February 6, 2024

Mastercard Is Using AI to Fight Fraud

Credit card fraud threatens both personal spending as well as your business' finances. Bad actors use a series of tricks to steal credit card information, and use that data to spend as much as they can before the target catches...
February 6, 2024

Senators Introduce New “Farm and Food Cybersecurity Act”

While personal responsibility goes a long way in preventing cybersecurity attacks, so too does legislative action. The more we can shore up our security from the top, the better off the entire system is. That's why it's intriguing to see...
January 30, 2024

Apple’s Stolen Device Protection Is a Powerful Security Tool

A good password is essential for securing your devices and data. However, it isn't foolproof. If a thief knows your iPhone passcode, for example, not only could they steal your device and unlock it, they could use that passcode to...
January 30, 2024

These Common Passwords Could Compromise Your Business

While there are plenty of excellent cybersecurity practices to follow, perhaps one of the top tips to keep in mind is to always use unique, difficult-to-guess passwords for all of your accounts. Of course, it's tempting to use a password...
January 23, 2024

How Copilot Can Boost Your Business in Microsoft 365

AI is everywhere these days, and Microsoft is certainly no exception. If you've been hearing about the company's latest AI endeavor, Copilot, you might be curious about what the tech can really do, and whether it's worth it for your...
January 23, 2024

Samsung Has Over 70 Bug Fixes for Your Galaxy Phone

The good thing about using a device made by a major company is the updates are usually reliable and effective. So it is with Samsung: The company's January update comes with more than 70 bug fixes for your Galaxy phone....
January 16, 2024

Watch Out for Hackers on Your Google Accounts

Google wants to retire the password, which is why it (along with other tech giants) are pushing passkeys as a security successor. However, sometimes passwords aren't the weak point in a security system. Case in point: It seems there's a...
January 16, 2024

Make Sure to Update Your Recovery Emails

When you forget your password, or otherwise lose access to an account, a recovery email can help you get back up and running. While it might feel safe to set it and forget it, you would benefit from routinely updating...
January 8, 2024

These New AI Scams Are Getting Too Good

Artificial intelligence is an exciting a nascent technology, that is already capable of impressive feats. Not all of those feats are good, however.  Of course, you have the “good:” Large language models like ChatGPT can help you do just about...
January 8, 2024
1 3 4 5 6 7 25



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.