Protecting and Restricting iPads, iPhones, and Android Devices
Because many families, and business professionals, received new tablets for the holidays, it is important to consider security. Families, as well as businesses, may choose to restrict permissions on...
View ArticleMajor Flaw in Computer Processors Affects Security
A security vulnerability, that has existed for 10 years, has only recently been discovered. A patch for Linux has been released and Microsoft plans to release a patch next Tuesday. Apple will release a...
View ArticleThree Serious Trends to Watch Out for in Cyber Security
First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way, the importance of being able to restore data...
View ArticlePatching Nightmare – Please Forward to Your IT Pros
Intel says, again, to stop deploying patches. Java and other new patches need handling. Intel advises that IT Professionals stop deploying the current versions of patches for the recently discovered...
View ArticleHow Buying a Spare Printer can Vastly Improve Your Cyber Security
Imagine a scenario when an IT professional knows there is an urgent security problem in your firewall that needs to be addressed. And at the same time, your multi-function printer is broken. What...
View ArticleA New Opportunity for Your IT Pros to Protect your Servers
Attackers can take advantage of a large attack surface on your servers. Your IT professionals can drastically reduce the attack surface, and potentially save you money. When your IT team logs onto a...
View ArticleNew York City is Providing Automatic Protection for all iPhone Users, and So...
As the City of Atlanta is still recovering from the massive ransomware attack on March 22, NYC is launching a program that provides secure Internet access for residents and visitors at no charge. NYC’s...
View ArticleA Simple Change Can Help Protect Your Family, and It Works on Apple and Windows
There is a setting on your computer that can help protect your family. You don’t need to know this part: There is a service called Domain Name Service, DNS, that is a massive index for the Internet. If...
View ArticleHow to E-Mail Encrypted Attachments
E-mail messages can be intercepted or read by an unauthorized individual. When you want privacy, one way is to encrypt your documents before you attach them to your email message. Microsoft Office, for...
View ArticleAsk IT Pros to Check Your Routers and Firewalls
We audited a company last week and discovered that their web filtering tools, designed to stop users from accidentally landing on malicious websites, was not blocking dangerous sites. In these days...
View ArticleStop Hidden Attacks Buried in Email Attachments
When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned. And the friend or associate who sends you the attachment probably...
View ArticleWatch for Threatening Email Messages that Contain Your Actual Passwords
You may receive a threatening email message that shows you your actual username and password. The attacker may demand you pay them 2900, or some other significant amount. They threaten horrible things...
View ArticleThe Insanity of Your Network – Storing Keys in the Same Place as Everyone Else
Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet. You assign your IT team the...
View ArticleCan you Trust the Kindness of Tech Support Strangers?
If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your...
View ArticleStealing Tesla Cars, and Stealing Your Network with Agent Tesla
The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization’s security too.First the theft. Wired magazine published an article you can find by searching...
View ArticleYou Might Stop Receiving Essential Email Messages, and What to Do About It
If someone ever impersonates you via email, you may stop receiving legitimate email messages too. Computers belonging to people who received a fake email message may automatically send all new messages...
View ArticleHappy Computer Security Day!
November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages. Encourage and provide time to your team...
View ArticleAttackers are Targeting High Net Worth Individuals
An experienced high-level executive shared his concern about how attackers are investing more time targeting high net worth individuals. If you fall into that category, especially now, you must be...
View Article773 Million Passwords Exposed – Were You Exposed?
Today Troy Hunt announced that a collection of 773 million usernames and passwords were released. This release of passwords, dubbed Collection #1, contains usernames and passwords that have shown up on...
View ArticleFind Out if You Can Collect a Bundle from the Equifax Breach
There is a strong chance that hackers obtained your identity information in the Equifax breach. It exposed 148 million American’s sensitive information, and that sets you and your family up for...
View Article