Articles on this Page
- 06/28/18--14:37: _Ask IT Pros to Chec...
- 07/09/18--06:00: _Stop Hidden Attacks...
- 07/19/18--08:45: _Watch for Threateni...
- 09/10/18--09:07: _The Insanity of You...
- 10/19/18--11:56: _Can you Trust the K...
- 10/25/18--13:16: _Stealing Tesla Cars...
- 11/09/18--09:16: _You Might Stop Rece...
- 11/30/18--11:11: _Happy Computer Secu...
- 01/11/19--07:58: _Attackers are Targe...
- 01/17/19--15:22: _773 Million Passwor...
- 06/28/18--14:37: Ask IT Pros to Check Your Routers and Firewalls
- 07/09/18--06:00: Stop Hidden Attacks Buried in Email Attachments
- 10/19/18--11:56: Can you Trust the Kindness of Tech Support Strangers?
- 10/25/18--13:16: Stealing Tesla Cars, and Stealing Your Network with Agent Tesla
- 11/30/18--11:11: Happy Computer Security Day!
- 01/11/19--07:58: Attackers are Targeting High Net Worth Individuals
- 01/17/19--15:22: 773 Million Passwords Exposed – Were You Exposed?
We audited a company last week and discovered that their web filtering tools, designed to stop users from accidentally landing on malicious websites, was not blocking dangerous sites. In these days with ransomware and bad actors tricking users into clicking on dangerous links, it is essential to have web content filtering in place. Even if [...]
When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned. And the friend or associate who sends you the attachment probably does not know that the file is infected. A term to know is macro. It is a set of automated instructions [...]
You may receive a threatening email message that shows you your actual username and password. The attacker may demand you pay them 2900, or some other significant amount. They threaten horrible things if you do not pay. They may show you other information they have stolen including where you work, your date of birth, names, [...]
Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team the responsibility to secure and manage the keys to the vehicles, so you give each member of your IT [...]
If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice. Their program already installed on your computer should be able to give them all the information that [...]
The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization’s security too.First the theft. Wired magazine published an article you can find by searching the title: Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob. Then, you can watch a security cam [...]
If someone ever impersonates you via email, you may stop receiving legitimate email messages too. Computers belonging to people who received a fake email message may automatically send all new messages to the phony address instead of yours. Senders don’t realize what is happening, and you stop receiving essential email messages. Consider Nick. One day, [...]
November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages. Encourage and provide time to your team to keep your systems up to date with all critical security patches for operating systems, Office, browsers, Flash, Java, [...]
An experienced high-level executive shared his concern about how attackers are investing more time targeting high net worth individuals. If you fall into that category, especially now, you must be extra vigilant to protect yourself, your family, and your organization. The exploits may come in the form of attempts to get you to transfer money [...]
Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords that have shown up on the dark web over the past two or three years. Think of Collection #1 as being a value pack of bundled old password lists. [...]