Imagine IT (i)nsights

Imagine IT Insights

How to prevent VoIP threats

October 17th, 2018 Imagine IT 2018october17voip_a, encryption, firewalls, password protection, voip, vpn 2018october17voip_a, encryption, firewalls, password protection, voip, vpn

Now that digital collaboration is an integral part of any business, VoIP has become indispensable. Unfortunately, as it becomes more widespread, so do the threats against it. These attacks may not be as serious as ransomware or phishing, but they’re just as dangerous to SMBs. Here are five ways to protect your VoIP network against these threats.

5 Cybersecurity measures anyone can master

September 7th, 2018 Imagine IT 2018september7security_a, adobe flash, cybersecurity, encryption, https, multi-factor authentication, password managers, Security, software updates, tips and tricks 2018september7security_a, adobe flash, cybersecurity, encryption, https, multi-factor authentication, password managers, Security, software updates, tips and tricks

Avoiding malware and online scams takes a lot of work. You have to treat every email with suspicion, manage a long list of convoluted passwords, and avoid public WiFi networks. Ideally, you follow several other cybersecurity best practices, but many users don’t believe they’re worth the time. If you’re one of those people, here are five ways to...

4 misconceptions about the Cloud

July 18th, 2018 Imagine IT 2018july18webandcloud_a, cloud, encryption, g suite, office 365, security, small business, Web & Cloud 2018july18webandcloud_a, cloud, encryption, g suite, office 365, security, small business, Web & Cloud

Cloud computing has proven to be a cost-effective necessity for small businesses. However, there are still many owners who remain misinformed about the intricacies of cloud solutions. Here are some common misconceptions you should stop believing about the cloud.

How to wipe data from your old smartphone

June 27th, 2018 Imagine IT 2018june27android_a, android, data wipe, device, encryption, factory reset, security, smartphone 2018june27android_a, android, data wipe, device, encryption, factory reset, security, smartphone

Our mobile phones contain some of our most private data. There are contact details, confidential business emails, financial information, and possibly even risqué pictures that you wouldn’t want falling into the wrong hands. Factory reset is one way to get rid of everything if you’re moving on from your old phone, but there are a few other things...

Chrome to mark HTTP as 'not secure'

June 14th, 2018 Imagine IT 2018june14webandcloud_a, android, browsers, chrome, encryption, google, http, https, isp, let’s encrypt, lighthouse, mac, Security, security, Web & Cloud, windows 2018june14webandcloud_a, android, browsers, chrome, encryption, google, http, https, isp, let’s encrypt, lighthouse, mac, Security, security, Web & Cloud, windows

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as "not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the forthcoming changes.

Cybersecurity approaches to keep PHI safe

April 2nd, 2018 Imagine IT 2018april2healthcare_a, access, breaches, data, encryption, health, Healthcare, information, security 2018april2healthcare_a, access, breaches, data, encryption, health, Healthcare, information, security

Healthcare organizations have always kept the possibility of data breaches in mind, especially since 2017 witnessed the biggest and most expensive data breach to date. To counter this, more businesses have hired certified technicians, but that’s not enough. They also need to implement the most advanced systems and protocols to reinforce their...

The importance of HTTPS

March 7th, 2018 Imagine IT 2018march7webandcloud_a, chrome, encryption, firefox, http, https, https everywhere, phishing, security, Web & Cloud, web browsing 2018march7webandcloud_a, chrome, encryption, firefox, http, https, https everywhere, phishing, security, Web & Cloud, web browsing

Very few internet users understand the meaning of the padlock icon in their web browser’s address bar. It represents HTTPS, a security feature that authenticates websites and protects the information users submit to them. Let’s go over some user-friendly HTTPS best practices to help you surf the web safely.

Protect your Mac from security threats

February 23rd, 2018 Imagine IT 2018february23apple_a, apple, encryption, firewall, firmware, mac, password, privacy, security, server 2018february23apple_a, apple, encryption, firewall, firmware, mac, password, privacy, security, server

Mac users follow certain steps to maintain privacy and protect company data. But if you're too busy or short on resources, you might place security lower on your to-do list. Whatever your reason, the threat is real and you need to take steps to protect yourself.

Phishers use encrypted sites to scam

December 22nd, 2017 Imagine IT 2017december22security_a, cyber security, encryption, https, phishing scam, Security 2017december22security_a, cyber security, encryption, https, phishing scam, Security

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security.

Cybersecurity Essentials: VPN

December 6th, 2017 Imagine IT 2017december6security_a, cybersecurity, encryption, ip leaking, privacy, Security, server, virtual private network, vpn 2017december6security_a, cybersecurity, encryption, ip leaking, privacy, Security, server, virtual private network, vpn

Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN).