Articles on this Page
- 01/02/18--14:55: _Protecting and Rest...
- 01/04/18--14:39: _Major Flaw in Compu...
- 01/18/18--12:37: _Three Serious Trend...
- 01/23/18--09:55: _Patching Nightmare ...
- 02/16/18--09:33: _How Buying a Spare ...
- 03/29/18--10:12: _A New Opportunity f...
- 04/18/18--09:44: _New York City is Pr...
- 04/27/18--10:21: _A Simple Change Can...
- 05/11/18--08:31: _How to E-Mail Encry...
- 06/28/18--14:37: _Ask IT Pros to Chec...
- 07/09/18--06:00: _Stop Hidden Attacks...
- 07/19/18--08:45: _Watch for Threateni...
- 09/10/18--09:07: _The Insanity of You...
- 10/19/18--11:56: _Can you Trust the K...
- 10/25/18--13:16: _Stealing Tesla Cars...
- 11/09/18--09:16: _You Might Stop Rece...
- 11/30/18--11:11: _Happy Computer Secu...
- 01/11/19--07:58: _Attackers are Targe...
- 01/17/19--15:22: _773 Million Passwor...
- 01/02/18--14:55: Protecting and Restricting iPads, iPhones, and Android Devices
- 01/04/18--14:39: Major Flaw in Computer Processors Affects Security
- 01/18/18--12:37: Three Serious Trends to Watch Out for in Cyber Security
- 01/23/18--09:55: Patching Nightmare – Please Forward to Your IT Pros
- 02/16/18--09:33: How Buying a Spare Printer can Vastly Improve Your Cyber Security
- 03/29/18--10:12: A New Opportunity for Your IT Pros to Protect your Servers
- 05/11/18--08:31: How to E-Mail Encrypted Attachments
- 06/28/18--14:37: Ask IT Pros to Check Your Routers and Firewalls
- 07/09/18--06:00: Stop Hidden Attacks Buried in Email Attachments
- 10/19/18--11:56: Can you Trust the Kindness of Tech Support Strangers?
- 10/25/18--13:16: Stealing Tesla Cars, and Stealing Your Network with Agent Tesla
- 11/30/18--11:11: Happy Computer Security Day!
- 01/11/19--07:58: Attackers are Targeting High Net Worth Individuals
- 01/17/19--15:22: 773 Million Passwords Exposed – Were You Exposed?
Because many families, and business professionals, received new tablets for the holidays, it is important to consider security. Families, as well as businesses, may choose to restrict permissions on devices. Here’s how: Set a passcode on the device. Even a 4-digit code is much better than nothing. Just avoid 0000, 1111, 1234, 2580, or other [...]
A security vulnerability, that has existed for 10 years, has only recently been discovered. A patch for Linux has been released and Microsoft plans to release a patch next Tuesday. Apple will release a patch for OSX. For understandable reasons, many organizations are significantly behind schedule in applying patches. The patch won’t help protect your [...]
First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way, the importance of being able to restore data quickly. Downtime can be extremely expensive for some organizations, so make sure you can restore quickly enough, especially if your data is [...]
Intel says, again, to stop deploying patches. Java and other new patches need handling. Intel advises that IT Professionals stop deploying the current versions of patches for the recently discovered security flaws in CPU chips. Find details, just updated, by searching: Root Cause of Reboot Issue Identified Updated Guidance for Customers and Partners site:intel.com Do [...]
Imagine a scenario when an IT professional knows there is an urgent security problem in your firewall that needs to be addressed. And at the same time, your multi-function printer is broken. What problem will the IT professional address first? Most IT professionals will, and do, fix the printer first. They care about you and [...]
Attackers can take advantage of a large attack surface on your servers. Your IT professionals can drastically reduce the attack surface, and potentially save you money. When your IT team logs onto a server, the server’s screen looks similar to what you would experience looking at a Windows workstation’s screen. The display on the server’s [...]
As the City of Atlanta is still recovering from the massive ransomware attack on March 22, NYC is launching a program that provides secure Internet access for residents and visitors at no charge. NYC’s Mayor Bill de Blasio signed an executive order to establish the New York City Cyber Command. The command has developed the [...]
There is a setting on your computer that can help protect your family. You don’t need to know this part: There is a service called Domain Name Service, DNS, that is a massive index for the Internet. If someone in your family, or at work, types in make a wish dot com, DNS looks up [...]
E-mail messages can be intercepted or read by an unauthorized individual. When you want privacy, one way is to encrypt your documents before you attach them to your email message. Microsoft Office, for Windows and Mac, has a feature on the File menu called Protect Document. Choose that option, and enter a secret password. Use [...]
We audited a company last week and discovered that their web filtering tools, designed to stop users from accidentally landing on malicious websites, was not blocking dangerous sites. In these days with ransomware and bad actors tricking users into clicking on dangerous links, it is essential to have web content filtering in place. Even if [...]
When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned. And the friend or associate who sends you the attachment probably does not know that the file is infected. A term to know is macro. It is a set of automated instructions [...]
You may receive a threatening email message that shows you your actual username and password. The attacker may demand you pay them 2900, or some other significant amount. They threaten horrible things if you do not pay. They may show you other information they have stolen including where you work, your date of birth, names, [...]
Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team the responsibility to secure and manage the keys to the vehicles, so you give each member of your IT [...]
If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice. Their program already installed on your computer should be able to give them all the information that [...]
The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization’s security too.First the theft. Wired magazine published an article you can find by searching the title: Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob. Then, you can watch a security cam [...]
If someone ever impersonates you via email, you may stop receiving legitimate email messages too. Computers belonging to people who received a fake email message may automatically send all new messages to the phony address instead of yours. Senders don’t realize what is happening, and you stop receiving essential email messages. Consider Nick. One day, [...]
November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages. Encourage and provide time to your team to keep your systems up to date with all critical security patches for operating systems, Office, browsers, Flash, Java, [...]
An experienced high-level executive shared his concern about how attackers are investing more time targeting high net worth individuals. If you fall into that category, especially now, you must be extra vigilant to protect yourself, your family, and your organization. The exploits may come in the form of attempts to get you to transfer money [...]
Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords that have shown up on the dark web over the past two or three years. Think of Collection #1 as being a value pack of bundled old password lists. [...]