Archives - Vulnerability


Use automatic updates and reboots

A patch issue causing problems (or your own lack of IT urgency) can entice you to turn off automatic updates — no more annoying alerts! Months down the road, though, a hack through an unpatched vulnerability can infiltrate your system. Employ automatic updates and reboots so that you’re proactively dealing with issues before they become […]

Keep your software up to date

New vulnerabilities are continually emerging, but the best defense against attackers exploiting patched vulnerabilities is simple: keep your software up to date. You should enable software updates whenever possible. This is the most effective measure you can take to protect your computer, phone, and other digital devices. Try our Ultimate software it’s built-in vulnerability module […]

Stay protected while connected

The bottom line is that whenever you’re online, you’re vulnerable. If devices on your network are compromised for any reason, or if hackers break through an encrypted firewall, someone could be eavesdropping on you—even in your own home on encrypted Wi-Fi. Practice safe web surfing wherever you are by checking for the “green lock” or […]

Phishing — It only takes one time

Data breaches do not typically happen when a cybercriminal has hacked into an organization’s infrastructure. Many data breaches can be traced back to a single security vulnerability, phishing attempt, or instance of accidental exposure. Be wary of unusual sources, do not click on unknown links, and delete suspicious messages immediately.

How do you find out what software updates you need to install?

When software updates become available, vendors usually put them on their websites for users to download. Install updates as soon as possible to protect your computer, phone, or other digital device against attackers who would take advantage of system vulnerabilities. Attackers may target vulnerabilities for months or even years after updates are available. Some software […]

What is a Zero-Day Attack?

A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability (including the vendor of the target software). Until the vulnerability is alleviated, hackers can exploit it to negatively affect computer programs, data, additional computers or a network. An exploit directed at […]