Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Showcase


Channel Catalog


(Page 1) | 2 | 3 | 4 | newer

    0 0
  • 04/28/16--06:00: Security Version 2.0
  • Here is another powerful way to strengthen security – upgrade to the newest versions. Just like last week, your key tool will be your application inventory. It will look something like this… The application inventory shows how many machines have a specific program installed on them, such as: Qty – Application 18 – Adobe Flash […]

    0 0

    This applies to everyone, not just Gmail users. A researcher at Hold Security bought 272 million stolen passwords on the dark web. Some of the credentials were for Gmail. This is not Google’s fault. Whether you use Gmail or not, everyone, if they haven’t already, needs to enable two step login. Then it is very […]

    0 0

    After last week’s post about the stolen Google and Gmail passwords, one of our valued subscribers wrote back asking why it isn’t Google’s fault that the passwords were stolen. I know – it would be so easy to blame Google. Those passwords were gathered from other “stolen password repositories” posted on the dark-web. They were […]

    0 0

    Attackers prey on people trusting others. Watch out for these three common tricks. 1. Refuse to permit tech support to access your computer to help you. If this is your known service provider, then maybe you will decide to trust them. However, nobody else. Last week, I connected a new well known web-cam that is […]

    0 0

    Many users of TeamViewer are reporting that attackers are compromising their systems. Even users that use two-step logon, aka multifactor authentication, report that they have experienced breaches. So it does not appear to be a case of users re-using passwords. For now, until more is known, the most effective defense is to uninstall TeamViewer from […]

    0 0

    Your team’s healthy sleep stops hackers. Often, an attacker’s primary goal is to trick your workers. Trick them into clicking a link, opening an attachment, or following instructions that supposedly come from their boss. So, one of the best ways to protect your company is to arm your employees to make the best decisions. Your […]

    0 0

    GoToMyPC announced that they suffered a recent attack. Once again, this affected users who had used the same password at other sites too. Congratulations to you readers who have implemented two-step logon. The site twofactorauth dot org provides a list of services that provide a two-step login feature. If you know someone who uses GoToMyPC, […]

    0 0

    Mitch Resnick made a TED Talk entitled “Let’s teach kids to code.” He says that knowing how to code is an essential part of literacy. MIT, the Massachusetts Institute of Technology, created a programming language for kids called Scratch. I swore I would keep my kids away from computers until they are older, so they […]

    0 0
  • 07/25/16--08:06: Pain Free or Free Pain?
  • On July 29, Microsoft’s Windows 10 free upgrade offer ends. Many people are asking: Should you upgrade? If you plan to upgrade existing computers to Windows 10 anyway, and have tested it in your network, this may be the right time. Otherwise, you may join other businesses who stay on Windows 7 or 8.1. Free […]

    0 0

    In 2015 alone, companies had to pay 325 Million in ransom to recover their data. There were 407,000 attempted ransomware attacks. These statistics confirm how organizations just don’t understand what to do to protect their company. Please spread the word… The most effective protections are all free: Use application whitelisting, click-to-play, and take away local […]

    0 0

    On August 8, Delta had to cancel 2,000 flights due to a major technology malfunction. It could have been prevented. Delta reports that the glitch was triggered by a 22 year old power control system device that failed in their datacenter. Back in June, Delta’s CIO Rahul Samant made a very telling statement, “Technology is […]

    0 0

    What if you’d like to know each and every time a consultant attempted to access your systems? And would you like the ability to approve or deny each attempt? At a client’s office this week, one of the IT Professionals had an interesting idea. He can configure two-step logon to contact him, not the consultant, […]

    0 0

    Yesterday afternoon, I and some of the more than 100 other passengers on our jet were paying attention to the safety demo. Unexpectedly, the announcement included a statement that prohibited the use of a Samsung Galaxy Note 7 phone. Additionally, charging such a device is prohibited too. Now that’s harsh… or is it? Due to […]

    0 0

    Many users of TeamViewer are reporting that attackers are compromising their systems. Even users that use two-step logon, aka multifactor authentication, report that they have experienced breaches. So it does not appear to be a case of users re-using passwords. For now, until more is known, the most effective defense is to uninstall TeamViewer from [...]

    0 0

    Your team’s healthy sleep stops hackers. Often, an attacker’s primary goal is to trick your workers. Trick them into clicking a link, opening an attachment, or following instructions that supposedly come from their boss. So, one of the best ways to protect your company is to arm your employees to make the best decisions. Your [...]

    0 0

    You hear in the news that Yahoo, or some other company, got hacked and your username and password may be in the hands of attackers. There is a way to find out if your credentials were exposed. An Australian Web Security Specialist, Troy Hunt, has compiled a database containing usernames that have been stolen in [...]

    0 0

    Twice recently, I’ve been contacted by executives who explain that someone was impersonating them on Facebook. They used my friends’ own pictures, sent messages, posted information, and everything was very inappropriate. Each friend asked what to do, and here is the answer in case this happens to you… Immediately change your password on Facebook. If [...]

    0 0

    If your office has even one instance of a virus, ransomware, or any other kind of malware, that is a huge symptom. Yesterday, someone told me their security was good since they only get infected by a few viruses each year. Even a single infection means there is a possibility that their machines are already [...]

    0 0

    Phone operating systems store much of the information that you have in your phone in the cloud too. So, attackers stealing information from your phone can be as simple as gaining access to that data in the cloud. Additionally, some of the apps on your phone can mine all of this information and more, even [...]

    0 0

    To keep their job, IT Professionals must do three things. First, IT Professionals need to know that the boss is always right. If the executives say that they do not want to use passwords, then that settles it. Of course, IT Pros should make recommendations, but let the boss decide. IT Pros need to document [...]

(Page 1) | 2 | 3 | 4 | newer