Articles on this Page
- 12/01/16--09:32: _1 Million Android U...
- 12/12/16--09:00: _Finally, a Solution...
- 12/15/16--07:24: _More than 1 Billion...
- 01/03/17--07:33: _How My Daughter Alm...
- 01/19/17--09:33: _Spammed by a Taxi
- 02/09/17--08:17: _Alert IT to Graphic...
- 02/15/17--11:20: _If Bitcoin Went Awa...
- 02/23/17--05:00: _Protect Against Bad...
- 03/16/17--14:18: _E-Mail Protection S...
- 03/24/17--09:44: _Your iPhone and iPa...
- 03/28/17--08:33: _Alert – A Popular P...
- 04/18/17--08:36: _Alert Your IT Team ...
- 04/24/17--11:38: _Attackers Are Using...
- 05/03/17--09:04: _The Jet Seemed to E...
- 05/04/17--08:49: _The Google Scam Sho...
- 05/15/17--08:42: _Patching – 10 Steps...
- 05/17/17--09:08: _Get Apple’s Urgent ...
- 05/19/17--07:57: _Straw, Sticks, or B...
- 06/21/17--12:26: _Protect Yourself: D...
- 06/21/17--12:34: _Online Password War...
- 12/01/16--09:32: 1 Million Android User Accounts Reported Hacked
- 12/15/16--07:24: More than 1 Billion Passwords Stolen – What to Do
- 01/19/17--09:33: Spammed by a Taxi
- 02/09/17--08:17: Alert IT to Graphics Component Patches
- 02/15/17--11:20: If Bitcoin Went Away, would Ransomware be Defeated?
- 02/23/17--05:00: Protect Against Bad Attachments and Employee Downloads
- 03/16/17--14:18: E-Mail Protection Solution
- 03/24/17--09:44: Your iPhone and iPad are in Danger
- 04/18/17--08:36: Alert Your IT Team – Urgent Patch for Network Servers
- 04/24/17--11:38: Attackers Are Using Mobile Devices as a Bridge into Your Network
- 05/03/17--09:04: The Jet Seemed to Explode
- 05/15/17--08:42: Patching – 10 Steps to Seal the Holes in Your Armor
- 05/17/17--09:08: Get Apple’s Urgent Patches that Fix Dozens of Security Holes
- 06/21/17--12:26: Protect Yourself: Do Not Connect a New Computer to the Internet
- 06/21/17--12:34: Online Password Warehouse, OneLogin, Discovers Massive Breach
It was reported yesterday that malicious apps running on Android phones has resulted in 1 million Google user accounts being hacked. Check Point Software Technologies estimates that 75% of Android phones are still vulnerable to this attack. Once the attackers take over the phone, they can then gain access to the user’s Google accounts. Often [...]
It happens all the time: A user clicks on a link in an email message, and the computer gets infected. Ransomware can lock up the data on the drive or even your servers. Sensitive data can be stolen, wire transfers attempted, and other bad things can happen. When a user is tricked into clicking on [...]
You hear in the news that Yahoo, or some other company, got hacked and your username and password may be in the hands of attackers. There is a way to find out if your credentials were exposed. An Australian Web Security Specialist, Troy Hunt, has compiled a database containing usernames that have been stolen in [...]
My 7-year-old daughter has been very ill since Thanksgiving. She has been under the careful care of her pediatricians at the medical system to which we belong. They have more than 10 million health plan members across the US, so they can be trusted, right? Even with multiple appointments and following the pediatricians’ prescriptions exactly, [...]
Spam isn’t just for email anymore. I just landed at Kansas City International airport. They don’t have a taxi line; passengers go to a special taxi phone, lift the handset, and the taxi dispatcher said, “Taxi 1515 will be there in 2 minutes.” Less than a minute later, a man approached saying, “I am the [...]
Security patches are so important to security, but they are difficult to manage and you always stand the risk of a patch interrupting productivity. And there are some new patches your IT team needs to know about… Microsoft has released a series of patches related to the Windows Graphics Component. As IT professionals, we are [...]
It is day four of the massive RSA security conference, and it is incredibly enjoyable to be gathering the latest security information. Was visiting over lunch with a gentleman from London, and he made the comment that Ransomware would no longer exist, were it not for Bitcoin. He pointed out that governments and banks are [...]
Imagine giving each of your team members a loaner computer every time they need to open a file that they download or receive as an attachment. The loaner computers won’t be connected to your network, so if a file is infected, ransomware and other viruses would not affect your network. Note: This blog is written [...]
Everyone is concerned about the danger of a user clicking on a link in an email message, perhaps invoking a ransomware attack, or users responding to requests to transfer money. There are tools that will help.FYI: We do not receive any kind of compensation or payment for recommending products, nor do we endorse any of [...]
If you use Apple products, here is what to do to protect yourself. By now, you’ve probably heard that attackers have told Apple that they have access to millions of iPhone and iCloud accounts. The hacking group calls themselves “Turkish Crime Family.” They are demanding $100,000 in gift cards, or $75,000 in cryptocurrency by April [...]
A password manager company announced that there is a vulnerability that could allow attackers to gather stored passwords. Password managers are very helpful since they make it so convenient to be secure, and can greatly simplify and speed up the login process at websites. Many people feel password managers are worth the risks, especially when the [...]
Many organizations use VMware to host their servers. VMware has released an urgent update they label as Critical. Patching VMware, which is often used as a platform for many of your other servers, can be frustrating. If the patch causes a problem, there is a risk that all your servers hosted on that machine will [...]
A newly discovered virus, called Milky Door, permits attackers to connect to your organization’s network through apps on mobile devices. The users have no idea their mobile device is being used in this way. This is an example of how, just because an app is in the app store, that does not mean that the [...]
We were flying at more than 500 mph, seven miles straight up. It was around 11 pm and we were over the Northern US during a snowstorm. The big explosion in the plane surprised everyone… Before our takeoff in Minneapolis, the flight attendant announced that this was the newest aircraft in this airline’s entire fleet and [...]
The Google scam: If anyone receives an email that contains a link to Google Doc, do not click on the link. Even if the email appears to be from someone they know and trust. Google did not get hacked, but someone else who has your email address in their contact list probably did. Anyone who [...]
You’ve likely heard of the massive ransomware attack that has taken down so many organizations, including hospitals, around the world. The ransomware appears to have exploited a bug for which Microsoft released a fix a little over a month ago. Follow these 10 steps to help protect your organization from this, and from future attacks: [...]
For those of you with Apple products, Apple just released some important updates. Knowing that updates might cause a problem, please back up your computer first. You are backing up all the time already, right? Time Machine is a wonderful tool and is built in. If you want to supplement Time Machine with an additional [...]
Just yesterday, someone told me they think they are secure because they have anti-virus, strong passwords and a firewall. Last weekend, I asked my daughter to tell me a fairy tale. She chose The Three Little Pigs and the Big Bad Wolf. As she told the story, it became so clear that organizations use straw, [...]
Some people turn on a brand new computer, connect to the Internet, and download anti-virus to the their new computer. When you think about it…It would be better to install anti-virus on the new computer, and have more protection, before connecting it to the Internet. This involves going to a computer you trust that is [...]
Without getting complicated, OneLogin, Okta, Centrify, Microsoft, RSA SecureID Access, SalesForce App Cloud, and even more basic password managers store user identities, and login information. Using these services means that users only need to remember one password and all of their other logins are handled for them. The most important thing about the OneLogin breach: [...]