Are you the publisher? Claim or contact us about this channel


Embed this content in your HTML

Search

Report adult content:

click to rate:

Account: (login)

More Channels


Channel Catalog


older | 1 | 2 | 3 | (Page 4)

    0 0

    Because many families, and business professionals, received new tablets for the holidays, it is important to consider security. Families, as well as businesses, may choose to restrict permissions on devices. Here’s how: Set a passcode on the device. Even a 4-digit code is much better than nothing. Just avoid 0000, 1111, 1234, 2580, or other [...]

    0 0

    A security vulnerability, that has existed for 10 years, has only recently been discovered. A patch for Linux has been released and Microsoft plans to release a patch next Tuesday. Apple will release a patch for OSX. For understandable reasons, many organizations are significantly behind schedule in applying patches. The patch won’t help protect your [...]

    0 0

    First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way, the importance of being able to restore data quickly. Downtime can be extremely expensive for some organizations, so make sure you can restore quickly enough, especially if your data is [...]

    0 0

    Intel says, again, to stop deploying patches. Java and other new patches need handling. Intel advises that IT Professionals stop deploying the current versions of patches for the recently discovered security flaws in CPU chips. Find details, just updated, by searching: Root Cause of Reboot Issue Identified Updated Guidance for Customers and Partners site:intel.com Do [...]

    0 0

    Imagine a scenario when an IT professional knows there is an urgent security problem in your firewall that needs to be addressed. And at the same time, your multi-function printer is broken. What problem will the IT professional address first? Most IT professionals will, and do, fix the printer first. They care about you and [...]

    0 0

    Attackers can take advantage of a large attack surface on your servers. Your IT professionals can drastically reduce the attack surface, and potentially save you money. When your IT team logs onto a server, the server’s screen looks similar to what you would experience looking at a Windows workstation’s screen. The display on the server’s [...]

    0 0

    As the City of Atlanta is still recovering from the massive ransomware attack on March 22, NYC is launching a program that provides secure Internet access for residents and visitors at no charge. NYC’s Mayor Bill de Blasio signed an executive order to establish the New York City Cyber Command. The command has developed the [...]

    0 0

    There is a setting on your computer that can help protect your family. You don’t need to know this part: There is a service called Domain Name Service, DNS, that is a massive index for the Internet. If someone in your family, or at work, types in make a wish dot com, DNS looks up [...]

    0 0

    E-mail messages can be intercepted or read by an unauthorized individual. When you want privacy, one way is to encrypt your documents before you attach them to your email message. Microsoft Office, for Windows and Mac, has a feature on the File menu called Protect Document. Choose that option, and enter a secret password. Use [...]

    0 0

    We audited a company last week and discovered that their web filtering tools, designed to stop users from accidentally landing on malicious websites, was not blocking dangerous sites. In these days with ransomware and bad actors tricking users into clicking on dangerous links, it is essential to have web content filtering in place. Even if [...]

    0 0

    When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned.  And the friend or associate who sends you the attachment probably does not know that the file is infected. A term to know is macro. It is a set of automated instructions [...]

    0 0

    You may receive a threatening email message that shows you your actual username and password. The attacker may demand you pay them 2900, or some other significant amount. They threaten horrible things if you do not pay. They may show you other information they have stolen including where you work, your date of birth, names, [...]

    0 0

    Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team the responsibility to secure and manage the keys to the vehicles, so you give each member of your IT [...]

    0 0

    If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice. Their program already installed on your computer should be able to give them all the information that [...]

    0 0

    The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization’s security too.First the theft. Wired magazine published an article you can find by searching the title: Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob. Then, you can watch a security cam [...]

    0 0

    If someone ever impersonates you via email, you may stop receiving legitimate email messages too. Computers belonging to people who received a fake email message may automatically send all new messages to the phony address instead of yours. Senders don’t realize what is happening, and you stop receiving essential email messages. Consider Nick. One day, [...]

    0 0
  • 11/30/18--11:11: Happy Computer Security Day!
  • November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages.  Encourage and provide time to your team to keep your systems up to date with all critical security patches for operating systems, Office, browsers, Flash, Java, [...]

older | 1 | 2 | 3 | (Page 4)