If You Get Hacked, Do Not Email Anyone About It
You’ve trained your users to be vigilant for symptoms of cybersecurity issues. Now teach them to share their concerns confidentially. Alert your users today: Tell them to, if they suspect something,...
View ArticleAttackers Can Take Control of Your Network in Three Seconds, and How to Stop...
An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network. The attacker does not need to know any passwords; they do not even need a...
View ArticleBeware: Attackers Buy Top Search Engine Results to Trick You
What seems to be the best way to find a company’s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a...
View ArticleEmergency Update if Your IT Team Uses SolarWinds Products, and How to Protect...
Bad Actors compromised a product called SolarWinds Orion and then used that as a vector attack organization. Ask your IT team if they use SolarWinds products, and if so, they must visit SolarWinds dot...
View ArticleThree of the Most Useful Links About the SolarWinds Attack:
Even if you don’t use SolarWinds, your suppliers and customers might. In some cases, your security is only as good as their security. There are so many webpages about the Solar Winds attack. Here are...
View ArticleTips and Tricks: An Unconventional way to Protect Yourself from SolarWinds...
Will running one rarely used program stop future attacks? It will in the SolarWinds attack and perhaps stop future compromises too. It makes sense that malware uses strategies to infect and hide inside...
View ArticlePrepare Now to Recover Quickly from Ransomware on Mac and Windows Computers
Equip all of your Work from Home users with a cloned drive so they can help protect your network and get up and running quickly if they get ransomware or if their hard drive crashes. Protect your home...
View ArticleYour Phone, Tablet, and Computer Started Hiding You – and How to Overcome the...
A friend contacted me a few days ago and said, “Every few weeks, I’ll go to a site, and it will say that this appears to be a new device? For example, I’ve looked at my Twitter account this morning,...
View ArticleProtect Loved Ones from Tech Support Scams and Share this Hilarious Video
A wonderful person who is tech-savvy sent an e-mail message yesterday explaining that she cannot trust her mom with a computer or phone anymore because scammers posing as Microsoft stole $2000 from...
View ArticleHacker Contest Nets Winners Hundreds of Thousands of Dollars
Hackers competing in this year’s PWN2OWN competition earned hundreds of thousands of dollars. Who paid them? The companies they hacked. But it isn’t ransomware; this is an example of bug bounty...
View Article