• content/en-au/images/repository/isc/snapchat-hackers-thumbnail.jpg

    Snapchat Hackers: 5 Ways to Protect Your Family

    In 2014, photo sharing service Snapchat ran afoul of hackers after the company claimed it had no knowledge of any security vulnerabilities. To prove that such loopholes existed...

    Read More
  • content/en-au/images/repository/isc/online-shopping-safe-tips-thumbnail.jpg

    Stay Safe with these Online Shopping Tips

    You’re shopping online, you’ve found a great deal on a new camera, and you don’t want to miss out. However, you’ve never heard of the retailer before. Or maybe it’s one you know, but you think there’s something not quite right about it…

    Read More
  • content/en-au/images/repository/fall-back/02.jpg

    Protecting Wireless Networks

    Using a wireless network in your home gives you the convenience of being able to use your computer virtually anywhere in your house — and still be able to connect to other computers on your network or access the Internet. However, if your wireless network is not secure, there are significant risks.

    Read More
  • content/en-au/images/repository/isc/computer-adware-protection-thumbnail.jpg

    Computer Adware Protection

    Adware is the name that computer professionals give to computer programs that display ads on your computer, or that perform related advertising or marketing functions. In addition to showing you ads, these programs may divert your searches to advertising websites without telling you. Or they may gather your personal information for marketing purposes, also without telling you.

    Read More
  • content/en-au/images/repository/isc/public-wifi-risks-image-thumbnail.jpg

    How to Avoid Public WiFi Security Risks

    The recent explosion of free, public WiFi has been an enormous boon for working professionals. Since these free access points are available at restaurants, hotels, airports, bookstores, and even random retail outlets, you are rarely more than a short trip away from access to your network, and your work. This freedom comes at a price, though, and few truly understand the public Wi-Fi risks associated with these connections. Learning how to protect yourself will ensure your important business data remains safe...

    Read More
  • content/en-au/images/repository/isc/android-security-tips-five-thumbnail.jpg

    Android Security- Five Must Know Tips

    The Android platform has recently exploded in popularity, and hackers and thieves have taken notice. They've used the open-source operating system's shortcomings to steal information from users, or to steal cash directly in the form of premium text fees. But the basic steps toward proper Android security are neither expensive nor difficult. Following these five simple steps will provide a solid foundation for protecting yourself as you merge your life, information and finances with your mobile device...

    Read More
  • content/en-au/images/repository/isc/5-internet-privacy-and-security-tips-thumbnail.jpg

    How To Provide Internet Security for Kids

    The best tool to avoid spyware and stay safe on the Internet is your own brain.

    Read More
  • content/en-au/images/repository/fall-back/09.jpg

    Malware and Exploit Detection

    In order to deliver adequate computer protection, antivirus software should be capable of detecting a very wide range of existing malicious programs, detecting new modifications of known computer viruses, worms and Trojan viruses and detecting malicious software that’s located in packaged files.

    Read More
  • content/en-au/images/repository/isc/how-to-run-a-virus-scan-thumbnail.jpg

    How to Run a Virus Scan the Right Way

    Correctly running a virus scan is one of the best defenses against malware and other threats. Find out how to do it the right way here. 

    Read More
  • content/en-au/images/repository/fall-back/13.jpg

    Running More Than One Antivirus Program

    In most cases, it is not possible to run two antivirus programs simultaneously on a single computer. Even though users may be tempted to try to implement what they might regard as ‘dual protection’, there are good reasons why trying to operate two different antivirus products will normally cause difficulties.

    Read More
Resources not available.