MUO

Data Security

Page 6

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
a person typing on a laptop 1
Make Your MySQL Server More Secure With These 7 Steps

How can you make sure your MSQL database is safe from hackers? Take a belt-and-braces approach with this handy checklist.

By 
VeraCrypt logo on picture of chained fence 1
How to Use VeraCrypt’s Advanced Features to Secure Important Files

Are you encrypting your data using VeraCrypt? Here are some advanced settings to help you protect your sensitive files.

By 
Woman Working on a Computer Outside 1
What Is an Evil Twin Attack and How Can You Prevent It?

Do you often use public Wi-Fi? You might fall for an evil twin attack. So what is it? And how can you stay safe?

By 
person logging into instagram on phone with google authenticator logo in front 1
Lost Your Phone With a Google Authenticator App? What to Do Next

Lost your smartphone and, with it, the Google Authenticator that lets you sign in securely to various accounts? Here's what you need to do.

By 
VeraCrypt and Microsoft Windows logos on a picture of a lock and chains 1
How to Encrypt a Windows System Drive With VeraCrypt

Here's how to keep your Windows drive or partition secure using encryption courtesy of VeraCrypt.

By 
Man writing code on a laptop computer 1
What Are Bug Bounty Programs? Here's Everything You Need to Know

Have you found a flaw in a system or product? Want to know how ethical hackers actually make money? That's where bug bounties come in.

By 
Padlock graphic illustration seen on dark blue background  1
What Is the Best Encryption Software?

Looking to render your files unreadable to hackers and other intruders? Here are the best services that encrypt your data.

By 
Server room with cloud, network and computer symbols 1
What Is a Privilege Escalation Attack?

As the name suggests, privilege escalation attacks can become very damaging, very quickly. So what are they? And how are they carried out?

By 
TikTok profile photo of phone screen 1
How to Download All of the Data TikTok Has About You

Do you want to find out what TikTok knows about you? Here's a quick guide to downloading your data.

By 
Smiling Man on a Laptop 1
What Is Data Profiling and Why Do You Need It?

Data profiling involves the analysis and reviewing of information in your network, but how can this keep your system safe?

By 
web-app-increase-security-with-http-headers 1
What Are HTTP Security Headers and How Do You Use Them?

How can you increase the security of your website? Security headers are a great and simple way of keeping your visitors safe from hackers.

By 
A laptop running code beside flower vases on a counter 1
What Is the VENOM Vulnerability and How Can You Protect Yourself From It?

You might have heard that the VENOM vulnerability might be worse than Heartbleed, but is that true? What is VENOM? What can you do about it?

By 
large printing hewlett packard 1
Your Printer Contains Sensitive Data: 4 Ways to Safely Get Rid of It

Looking to get rid of your old printer? It might contain personal details you don't want falling into the wrong hands. So what can you do about it?

By 
locked laptop and skull flag 1
What Is Screen Locker Ransomware and How Can You Remove It?

Screen Locker is a duplicitous ransomware that locks you out of your device but doesn't necessarily encrypt all your data.

By 
incogni-featured-image-3 1
What to Do After a Data Breach and How to Protect Yourself

If you find your data has somehow been compromised, you need to act fast. Here's what to do.

By 
Router and Wi-Fi symbol seen on black background  1
Is Your Internet Connection Secure? Use This App to Find Out

How do you check whether your network is secure? Using this simple app can help you determine whether your internet connection is safe.

By 
black and white vpn globe graphic with alert symbol 1
The 5 Best Countries to Connect to Using a VPN

Understanding how different countries handle your privacy can make or break a VPN. We take a look at countries that are best for VPN connections.

By 
Woman Using a Laptop and Mobile Phone 1
5 Access Control Best Practices You Need to Secure Your System

How can you look after all your data when so many users might have access to it? It's not as difficult as might seem...

By 
iphone charging port next to lightning charging cable 1
What Is Juice Jacking? Why You Should Avoid Public Charging Stations

Are public charging stations for your smartphone dangerous? You could at least be a victim of juice jacking...

By 
Young Woman Browsing on a Computer 1
What Is Access Control and Why Do You Need It?

You don't want everyone have access to your devices or your data. Here's how you monitor who gets in and who doesn't.

By 
4 5 6 7 8
Page 6 / 15