5 tips for a cyber-secure home office experience

5 tips for a cyber-secure home office experience

If the coronavirus has you working from home for the next few weeks, don’t forget about cybersecurity best practices that can help defend against a cyberattack.Along with the coronavirus upsurge, new “opportunities” have blossomed for cybercriminals in at least two...
Protecting customer data for small offices

Protecting customer data for small offices

The UK may have slid out of Europe amid tears and champagne but the EU’s General Data Protection Regulation still applies to both European and UK small businesses up until 31 December 2020 because of a transition period. This transition period may well be extended if...
Cybersecurity checklist for small offices

Cybersecurity checklist for small offices

How many small offices have time for complex cybersecurity? They need to get on with the business of generating revenue, bringing in new clients and making sure everything is running as smoothly as possible. But cybersecurity doesn’t have to be complex or...
How to ensure protection for your smart devices

How to ensure protection for your smart devices

Ask a lot of people are they concerned that smart devices are transmitting data back to the manufacturer and many will shrug their shoulders and mutter, ‘Who cares?’ This is probably because they don’t know the type of data that is being culled. For instance, does a...
Avira drives IoT security for the smart home with TP-Link’s new HomeCare™ Pro for routers

Avira drives IoT security for the smart home with TP-Link’s new HomeCare™ Pro for routers

Avira is pleased to be driving TP-Link’s new HomeCare™ Pro, the security platform launched at CES. This new combination of TP-Link’s router experience with Avira’s security expertise lets consumers easily ensure the privacy and security of their smart homes. Smart...
Reclaim your Security, Privacy and Freedom

Reclaim your Security, Privacy and Freedom

Have you ever heard of Kevin Mitnick? He was a notorious hacker who used to be on the US government’s “Most Wanted” list. He served five years in prison for computer fraud. But since his release, he has built a career working as a security consultant. Today he is a...