Articles on this Page
- 06/28/17--12:31: _Protect Yourself an...
- 07/03/17--12:09: _The UK Is Preparing...
- 07/14/17--14:19: _Recover Quickly if ...
- 07/21/17--08:43: _Fix A Computer in M...
- 07/24/17--06:00: _Hacker Convention S...
- 08/29/17--08:58: _Moms, Dads, and Fri...
- 09/05/17--09:09: _Make Life Easier – ...
- 09/08/17--13:09: _What You Need to Do...
- 09/18/17--09:10: _Credit Monitoring i...
- 09/19/17--08:12: _Your Software, such...
- 09/25/17--08:18: _New iPhone and iPad...
- 09/29/17--08:17: _Do the Basics. Do n...
- 10/06/17--06:00: _Please Alert Your I...
- 10/06/17--08:15: _5 Steps to Take Now...
- 10/17/17--06:33: _Wireless Security i...
- 11/21/17--08:31: _Portable Radios Can...
- 11/28/17--09:04: _A Secret Operating ...
- 11/29/17--08:25: _Mac Vulnerability P...
- 12/05/17--09:19: _One Setting Can Pro...
- 12/14/17--10:48: _About Half of All B...
- 07/03/17--12:09: The UK Is Preparing to Attack Hackers with Army, Navy and Air Force.
- 07/21/17--08:43: Fix A Computer in Minutes and It Works Almost Every Time
- 07/24/17--06:00: Hacker Convention Starts Later This Week
- 09/05/17--09:09: Make Life Easier – Go Back to Easy Passwords
- 09/08/17--13:09: What You Need to Do to Protect Yourself after the Equifax Breach
- 09/19/17--08:12: Your Software, such as CCleaner, May Have Backdoors
- 10/06/17--06:00: Please Alert Your IT Pros – Increase Your Security Log File Capacity
- 10/06/17--08:15: 5 Steps to Take Now Even if You do not use Kasperski Anti-Virus
- 10/17/17--06:33: Wireless Security is Broken & What You Need to Do
- 11/21/17--08:31: Portable Radios Can Replace Family Phones
- 11/28/17--09:04: A Secret Operating System is Running Inside Your Computers
- 11/29/17--08:25: Mac Vulnerability Permits Unauthorized Login
- 12/05/17--09:19: One Setting Can Protect Your Network from Ransomware
A new strain of Ransomware, dubbed P e t y a, is gaining momentum infecting companies and home users. Worst of all, in addition to holding files ransom until you pay up, it appears to be infiltrating corporate networks to steal usernames and passwords too. Be sure that you: 1. Apply the most recent security [...]
The UK is preparing to attack hackers with Army, Navy and Air Force. Sir Michael Fallon, the UK’s defense secretary, warned attackers that the UK will hunt them down, and respond not just in cyber-space, but also using air, land, and sea forces. Imagine soldiers, drones, and even missiles directed at anyone the UK identifies [...]
Ransomware is a common problem. If an attacker encrypts all your files and demands that you pay ransom to unlock your files, you will want to be able to recover quickly. Regular backups are not enough. Regular backups, including file backups, can do a great job of protecting your documents, pictures, and other files. But [...]
I was stranded in the Portland airport last night because of a mechanical failure on the first flight. You’ve had similar situations for sure. What would your travel experience be like if the airlines could immediately reset a plane to be brand new if it breaks? With computers, you can be up and running ASAP. [...]
Expect to see an increase in interesting news stories about what can be hacked this week. The big hacker convention DEFCON starts this week and lots of new announcements will be made as part of the program. If you will be in Vegas, leave your laptop and phone at home – lest you end up [...]
School is starting again and many students need computers. Take these important steps to help make them more secure:In addition to how they back up now, they also need to perform image backups that will back up everything, even programs, so that restore operations can go quickly and not interfere with schoolwork. Image backup tools [...]
NIST, the National Institute of Standards and Technology in the US, is releasing new password standards that make passwords so much easier… Using plain letters is enough; numbers and symbols are optional. Passwords need to be long, at least 8 characters. 16 or more is better. You don’t have to reset passwords unless you suspect [...]
You may be one of the 143 million people affected by the Equifax hacking breach that was announced yesterday. Data stolen may include contact information, dates of birth, driver’s license information, and Social Security numbers. Attackers can make money selling the information to people who could steal your identity and take out loans in your [...]
Regarding the Equifax breach, the breach affects about half of America’s population, so take action. Experts agree that one of the best things you can do to protect yourself is to place a credit freeze on your credit reports.Credit monitoring is nice because it can tell you something bad has already happened, but prevention is [...]
Can you trust programs you download? Millions of users, including outsourced computer firms, use a program called CCleaner on their own and on customers’ computers. CCleaner just announced that some of its software was compromised and has been stealing data from users’ computers. Every program that you install on your computer is a potential security [...]
The new Apple iOS 11 has a feature that appears to permit you to turn Wi-Fi on and off from the easy to reach Control Center. However, some people in the security community are concerned since the setting does no such thing. Your iPhone and iPad will prompt you to upgrade to the new iOS [...]
This week, someone told me about a group of CEOs who came to the conclusion that their IT security was handled since they installed an artificial intelligence (AI) based threat protection tool. They didn’t know it, but they were wrong. Having a false sense of security is dangerous and can be devastating to a CEO’s organization, [...]
Windows computers can keep a log of security events, such as failed logon attempts. It is helpful to know if attackers are trying to gain access to your network. When the log fills up, it overwrites itself with the oldest events first. By default, the log files are very small, and that makes it much [...]
According to the Wall Street Journal, followed by the Washington Post, Russian hackers used Kaspersky anti-virus to steal NSA cyber defense information off of an employee’s home computer. Even if you do not use Kaspersky, you still need to take 5 important steps, as described below. There is no guarantee that other anti-virus software is [...]
Many organizations rely on a wireless password to protect their Wi-Fi networks. Behind the scenes, that password is used as part of a security protocol called WPA2. An attack, dubbed KRACK, has been announced that breaks that security. The attack can permit attackers to potentially eavesdrop on your network traffic and your communications, change information, [...]
This is the time of the year when youngsters remind parents that all of their friends have phones, the latest model is out, and everyone is getting one! Some parents ask if there is an alternative. Yes. If you want to be able to reach them when they are off playing around the neighborhood, or [...]
If this gives you a sinking feeling, it should. What most people don’t know is that, if your computer uses an Intel brand CPU, there is a hidden microprocessor dedicated to running a second operating system called MINIX. And MINIX is running right now. That’s right. You have a second computer running inside each of [...]
Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do: First, see if you are vulnerable. Click on the apple symbol on the top left of your screen, then choose About This Mac. If you have macOS High Sierra, you are probably vulnerable. [...]
Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network. By default, all of your computers permit communication between each other, and attackers use those same communication channels to spread attacks from one machine to the next. The solution is so [...]
In our experience of auditing after breaches have happened, about half were caused by a service provider working for the company that gets breached. Almost always, the vendor or contractor had no malicious intent. Their organization’s own IT systems were not secure, and/or their team members performed actions in a non-secure way. Be sure the [...]