WPS Office Releases Urgent Guidelines on Protecting Office Software Files from the WannaCry Ransomware Virus

According to reports, more than 200,000 victims in 150 countries have been negatively impacted by the WannaCry ransomware virus,…

Andy Pan

Using Bro to explore personal networks, like an AWS Wordpress blog

My personal Wordpress blog was hacked a few weeks ago. I hadn’t checked my simple AWS micro instance in…

Guest Blogger

Cyber Security Predictions for 2017

As India geared up to go digital, a group of hackers reminded the country about the perils of the process.…

Guest Blogger

The Value of App Privacy Settings

With our escalating reliance on mobile devices, a major challenge that every industry must face is the security risk inherent…

William Wong

PDFs Revisited – For Security and Signatures

Back in July, we featured a post on how PDFs can make documents more secure. There we shared basics about…

William Wong

Why You Need to Know About Communications Protocols

We’ve spent the last few weeks discussing how various elements of communication—from etiquette and style, to grammar and…

William Wong

Why You Should Care About App Store Permissions

Why You Should Care About App Store Permissions We’re wrapping up our series on security best practices by examining…

William Wong

How ‘Android For Work’ Helps Secure Your Documents

In our continuing series on best practices for securing documents, let’s now dig deeper into another tool that can…

Cole Armstrong

5 Ways to Secure Your Mobile Purchases

5 Ways to Secure Your Mobile Purchases In our continuing series on security best practices, we’ve covered many ways…

William Wong

Making Documents More Secure with PDFs

Making Documents More Secure with PDFs As we continue our focus on using WPS Office to help you maintain the…

Joel Fristrom

Setting Up Your Password Tracker

Using Spreadsheets to Keep a “Password Tracker” It’s difficult for anyone to keep track of all of their account…

Cole Armstrong

Advanced Encryption Options for Extra Data Security

Advanced Encryption Options for Extra Data Security Our last two posts have detailed ways that you can make the data…

William Wong

Built-in Security Through Document Encryption

Built-in Security Through Document Encryption The most effective way to achieve data security is through encryption. Document encryption is simply…

Joel Fristrom

Best Practices for Securing Documents

Best Practices for Securing Documents Whether you’re working on a desktop or mobile device, it’s important to keep…

William Wong