As it’s traditional for this time of the year, we spent the past days looking at our statistics for 2015. We wanted to see what peaked your interest and what subjects to focus on in the upcoming year.

It came as a pleasant surprise to see that our security guides were so well received. Even though they’re much longer than the usual cyber security articles, they were the most accessed posts of the past year.

This gave us the idea to make a recap of our most read articles, just to make sure that you don’t miss any of them.


Top Five Security Guides We Published in 2015:


1. Nine Free Encryption Software Tools to Protect your Data

Our collection of recommended encryption tools was the most accessed article from this year, and also one with great engagement from our community.

If you still haven’t read this article, you should know that we covered 9 free encryption tools that can be used for hard drives, files, passwords management or online browsing.

Before you jump right into using these solutions, don’t forget that they are not enough to shield us from cyber attacks. Encryption tools should be used together with more security measures, as part of a bigger strategy to protect yourself, your information and your privacy.

Thanks to the great feedback we received, in the new year we’ll most likely publish an extended version of it.

[hs] Keep Confidential Data Safe From Online Criminals_600x312_v2


2. Ten Steps to Maximize your Home Wireless Network Security

Navigating the internet from the coziness of our homes gives us a false sense of security.

In an ideal world, you would only need to set up a user and a password, in order to keep the wifi connection unaccessed by your neighbours. But the web is dark and full of terrors, and wireless networks can be exploited by cyber criminals in all sort of ways.

In this article, we listed 10 pieces of advice that will help you improve your wireless network security.

Next year we’ll cover an even bigger area of security measures that you can take if you are working from home.

[hs] Home Network Security Guide_600x312_v2


3. What Is the Best Antivirus for Your PC

There is no correct, unique answer to this question. Nobody is safe from cyber risks and no security software is bulletproof.

However, we tried to cover three important criteria that will help you choose an antivirus that will fit your needs: user opinions, expert reviews and independent testing.

Remember that a traditional antivirus is not enough. You’ll also need an extra layer of protection, that will detect second generation malware.

And keep your software updated as well. If you use a free tool that offers automatic and silent software updates, you can eliminate up to 85% of security holes in your system.

[hs] How Do You Choose The Best Security Solution_600x312_v2


4. The Most Common Mistakes These 27 Cyber Security Experts Wish You’d Stop Doing

A golden security roundup: 27 cyber security experts shared with us what are the most common mistakes that we are all doing to sabotage our security.

This round-up comes with advices from experts from Symantec, AVG, Bitdefender, ESET, Malwarebytes, Sucuri, Rackspace, Trusteer (IBM Security), CYBERPOL and many more security organizations or publications.

[hs] Experts Round Up_600x312_v2


5. The 10 Critical Steps to Take After a Data Security Breach

Data breaches’ number and gravity have been on the rise in the past years, making them one of the most common cyber attacks.

If you discover that your company has been a victim to data breach, first of all you should take a deep breath and try not to panic. Here are the next 10 critical steps you should follow.

[hs] Crisis Management Guide_600x312_v2




If you think that you are immune from any of these cyber risks and nothing can happen to you, think again. All statistics prove the opposite.

What you can do is never let your guard down. Stay informed and take all the security measures that you can, in order to minimize the risks of a cyber attack. And may the odds be ever in your favor in the new year!

20+ Security Forums for Free Malware Removal Help

11 Steps to Improve Your Public Wi-Fi Security

Exposed: the 6 Need-to-Know Attributes of Advanced Cyber Attacks

Leave a Reply

Your email address will not be published. Required fields are marked *