Advanced Protection With 1Password

1Password is a great source to store secure information for both business and personal use. Here at Red Key, 1Password is our preferred password manager solution. By signing up, users have the option to create and save passwords, secure credit card information, and restore past submissions all under two-factor authentication for extra security.

Read more

Browser in Browser Attacks

A Browser-in-the-Browser (BIB) attack is a recent phishing technique that tricks users into sharing sensitive information. This form of attack replicates browser windows of legitimate domains, making it difficult for users to distinguish between the real and fake pages.

Read more

Coronavirus: 10 Ways to Stay Productive Using Technology

The Coronavirus is a major worry for all individuals and businesses. As the crisis evolves, these strategies will help keep you and your team productive through periods of potential remote work and business disruption. (For a modern Corona global cases tracker, click here.

Read more

Key elements of effective network security

Businesses benefit tremendously from connecting office computers and other devices to form a network. It allows you to easily share files and equipment like printers, communicate with others, view other people’s work, and collaborate on projects. But these networks also leave your computers and devices vulnerable to damage and your data vulnerable to theft.

Read more

Signs you’re being phished and who to report to

Have you ever gotten a text message stating that you have just won the lottery? Or perhaps you have received a warning email from your bank that requires you to fill out the attached form to unlock your account? Beware, you might become a victim of a phishing attack! Phishing is a form of identity […]

Read more

Security Alert: Digital Extortion is Here!

There is a new scam where a hacker contacts you from a random email address or even your own address to extort money. Two recent examples are: Hackers claim that they hacked your browser history, webcam and phones and have proof of adult content or infidelity.

Read more

Top 4 security threats you need to worry about

Hardly a month goes by without news of a major cybersecurity incident affecting thousands of people. And if you keep up with security blogs, you may think that there are just way too many threats to wrap your head around. So, what are the most important security threats you need to prepare for? Malware Malicious […]

Read more

Security Alert: Fake Emails On the Rise!

Nowadays hackers can spoof your email address or phone number. Spoofing means tricking your Outlook or Gmail into displaying that an email came from someone that it didn’t. Hacking has become very sophisticated and uses countless tricks to access your computer and subsequently, your money.

Read more