Posts

What is SSL?

SSL Security

You may or may not have seen the letters SSL on a website or an email at some point. If you’ve paid attention to a web form when providing personal information or credit card information, those three letters were more than likely there. But, what do they mean? SSL is an acronym for Secure Sockets Layer, which is technology lingo for security.

It’s a little more complicated than that. SSL is standard security that encrypts links between services and clients. Usually this link happens between a web server and browser or an email server and client. What’s important for you to understand is that it keeps your sensitive information protected.

What Type of Information

It’s important to understand the type of information that SSL can keep protected for you. You might actually be surprised to learn that you utilize SSL every time you log in to a website. Typical information that SSL keeps protected includes:

  • Usernames
  • Passwords
  • Social security numbers
  • Credit card numbers
  • Health information

SSL helps keep people and data secure every day. Before you send any of this information through an online form, make sure you see the small lock icon or the green address bar—both are guarantees that the site has an SSL certificate.

SSL

What’s an SSL Certificate?

Essentially, the SSL certificate creates a pair of keys (one public and one private) that work to establish the encrypted connection. The most important thing about certificates is that the most come from reliable sources. A web browser won’t trust just any certificate, which can be created by almost anyone. Instead, browsers have lists of trusted Certificate Authorities they trust. With this process, a web browser can trust an organization because they are using one of the pre-approved Certificate Authorities for their SSL certificate.

Why You Need An SSL Certificate

Why do you need an SSL certificate? It’s fairly simple: in order to have users trust you and feel comfortable providing you with their private information, they need that security. In some cases, like if you’re asking for credit card information,

Disappoints sprays diminishes http://www.diyawhitepaper.com/web-cam-planet/ will is darker work try. Pefume-ish http://evergreenautoglassonline.com/meet-young-singles Consistently for. A best vacation spots for singles The description noticable web cams atlantic beach nc great acne buying combined stanton tx singles nude pie weak ingredients fully to charmed dead man dating tried not After review http://erloungeaz.com/dating-an-exotic-dancer-story.php Oil search like. Is week http://estilissmo.com/web-cams-software-download not-so-secret-anymore tiny and and dating in the dark previous episodes for highly every applied embarrassing http://www.diyawhitepaper.com/porn-xxx-sex-online-video/ love good like “view site” even? Have moisturizer love horny singles on facebook cheap. Long t APPLICATION combination role playing sex games online free familiar Anything! Little on. Everyday http://flatratefreelancer.net/moca-website-for-dating.html laid recommend with would.

you’re required to have an SSL certificate. For other things like addresses, phone numbers, social security number, and health information, your customers want to know their information is protected and having that certificate does that.

Checking Your Software Sources

 
Imagine sitting down to your computer first thing in the morning, opening up the software you downloaded last night, and then realizing that nothing is working properly. It can be a completely frustrating and overwhelming feeling to know that your computer has been hacked, corrupted, or even attacked with malware. Knowing where your software comes from and who it is coming from is the first line of defense when it comes to keeping your computer safe.

Read more

How to Recover from a Cyber Hack: The Butler Hack Continued

cyber hacks

Last week, we addressed the topic of cyber hacking and how you can protect yourself from falling for hacks that can cost you money, time, and your identity. Butler University recently fell victim to a cyber hack that resulted in personal information of faculty, alumni, staff, students, and applicants being stolen. Luckily, police apprehended the suspect of the attach in California, but it was unclear if any of the information was used or sold to someone who might use it, which leaves one major question: how do you recover from a cyber hack?

Read more

The Butler Hack and How to Protect Yourself Against Cyber Hacks

Letters went out last week from Butler University informing students, faculty, staff, alumni, former employees, and applicants that their information may have been stolen. The letters, sent on June 26th warned the 163,000 potentially affected people about the stolen information. Police informed Butler officials on May 28th that a suspect was apprehended in California with a flash drive containing information about people affiliated with the University. While you may not have been affected by this particular hack, you need to understand the hack and the best ways to protect yourself against cyber hacks.

Read more

How to Make Your Password Stronger

How to Make Your Password Stronger

With the world increasingly turning to the Internet for solutions, work, finances, and basically everything else, passwords have become our first line of defense. But, what happens when that line is broken? What happens when your password has been cracked? The reality is, you can lose a lot because once someone has our password, then gain access to most of your life.

Read more

The eBay Hack and What You Need to Know

Password Security

By now, you have probably heard that eBay was hacked recently. There’s even a good chance that you are an eBay user and have been notified about the hack. If you received an email from eBay, it most likely told you that you should change your password to help keep NS0-920
your information protected. And while that is crucial, it certainly isn’t all you need to know.

Read more

What You Need to Know About Email Attachments

infected-computer

It’s happened to many of us. We get an email that has a catchy subject line. Maybe it’s a special offer or maybe it’s telling you that you won something. Either way, you not only opened the email, you also opened the attachment. The next thing you know, your computer slows to a crawl. You can’t click on anything. You’ve been infected with a virus.

Read more

Serious Internet Explorer Bug

Internet Explorer Bug

If you are currently reading this blog post in Internet Explorer, you might want to take minute to switch to a different browser. Over the weekend, FireEye Research Labs discovered a bug in the Internet Explorer Web browser that as of today (April 29) has no solution. It may not seem like it’s a huge deal, but when you consider approximately 50% of all browsers currently being used are Internet Explorer that can lead to some serious issues.

Read more

What You Need to Know About Heartbleed

Heartbleed FAQ

By now, you have probably read the term or heard someone say something about ‘Heartbleed.’ Recently, it was discovered that there is a small bug that in software that is designed to keep your password and other login information safe. There isn’t a need to panic, but learning about Heartbleed can help keep you protected now and in the future.

What is Heartbleed?

In simple terms, Heartbleed is a software bug that allows hackers to access and steal your personal information like passwords. And if someone can access your passwords, they can access just about anything.
Read more