Quantcast
Browsing all 113 articles
Browse latest View live

Protecting and Restricting iPads, iPhones, and Android Devices

Because many families, and business professionals, received new tablets for the holidays, it is important to consider security. Families, as well as businesses, may choose to restrict permissions on...

View Article


Major Flaw in Computer Processors Affects Security

A security vulnerability, that has existed for 10 years, has only recently been discovered. A patch for Linux has been released and Microsoft plans to release a patch next Tuesday. Apple will release a...

View Article


Three Serious Trends to Watch Out for in Cyber Security

First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way, the importance of being able to restore data...

View Article

Patching Nightmare – Please Forward to Your IT Pros

Intel says, again, to stop deploying patches. Java and other new patches need handling. Intel advises that IT Professionals stop deploying the current versions of patches for the recently discovered...

View Article

How Buying a Spare Printer can Vastly Improve Your Cyber Security

Imagine a scenario when an IT professional knows there is an urgent security problem in your firewall that needs to be addressed. And at the same time, your multi-function printer is broken. What...

View Article


A New Opportunity for Your IT Pros to Protect your Servers

Attackers can take advantage of a large attack surface on your servers. Your IT professionals can drastically reduce the attack surface, and potentially save you money. When your IT team logs onto a...

View Article

New York City is Providing Automatic Protection for all iPhone Users, and So...

As the City of Atlanta is still recovering from the massive ransomware attack on March 22, NYC is launching a program that provides secure Internet access for residents and visitors at no charge. NYC’s...

View Article

A Simple Change Can Help Protect Your Family, and It Works on Apple and Windows

There is a setting on your computer that can help protect your family. You don’t need to know this part: There is a service called Domain Name Service, DNS, that is a massive index for the Internet. If...

View Article


How to E-Mail Encrypted Attachments

E-mail messages can be intercepted or read by an unauthorized individual. When you want privacy, one way is to encrypt your documents before you attach them to your email message. Microsoft Office, for...

View Article


Ask IT Pros to Check Your Routers and Firewalls

We audited a company last week and discovered that their web filtering tools, designed to stop users from accidentally landing on malicious websites, was not blocking dangerous sites. In these days...

View Article

Stop Hidden Attacks Buried in Email Attachments

When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned.  And the friend or associate who sends you the attachment probably...

View Article

Watch for Threatening Email Messages that Contain Your Actual Passwords

You may receive a threatening email message that shows you your actual username and password. The attacker may demand you pay them 2900, or some other significant amount. They threaten horrible things...

View Article

The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else

Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team the...

View Article


Can you Trust the Kindness of Tech Support Strangers?

If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your...

View Article

Stealing Tesla Cars, and Stealing Your Network with Agent Tesla

The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization’s security too.First the theft. Wired magazine published an article you can find by searching...

View Article


You Might Stop Receiving Essential Email Messages, and What to Do About It

If someone ever impersonates you via email, you may stop receiving legitimate email messages too. Computers belonging to people who received a fake email message may automatically send all new messages...

View Article

Happy Computer Security Day!

November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages.  Encourage and provide time to your team...

View Article


Attackers are Targeting High Net Worth Individuals

An experienced high-level executive shared his concern about how attackers are investing more time targeting high net worth individuals. If you fall into that category, especially now, you must be...

View Article

773 Million Passwords Exposed – Were You Exposed?

Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords that have shown up on...

View Article

Find Out if You Can Collect a Bundle from the Equifax Breach

There is a strong chance that hackers obtained your identity information in the Equifax breach. It exposed 148 million American’s sensitive information, and that sets you and your family up for...

View Article
Browsing all 113 articles
Browse latest View live