Microsoft Will Stop Protecting Windows 7 on January 14, 2020
Windows 7 computers will still run, your anti-virus will still work, as will your other programs. But you are taking a significant risk because Microsoft will no longer provide security updates that...
View ArticleAvoid Opening Word Attachments – Check with IT First
When you receive an email message with a PDF attached, it is always best to confirm that you are expecting the attachment before opening it. However, if you receive a Word, Excel, or another file type...
View ArticleProtect Your Network Even when Attackers Trick Your Users
A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer. The bad actor immediately took over the network and started performing...
View ArticleWhat Will You Do if Your Customers’ Spam Filters Block Your Messages?
One of the ways your spam filter helps to stop unwanted messages is to block messages from mail servers with a bad reputation for spamming. What will you do if your company gets labeled as a spammer?...
View ArticleGood News for Windows 7 Users
Microsoft stops supporting Windows 7 on January 14, 2020. If you are not going to upgrade, there are options. Of course, in most circumstances, it is best to upgrade. Windows 7 is dated and missing the...
View ArticleRemember to Give Your IT Pros a Holiday Gift
Your IT Team pours out so much time and energy. If you aren’t already, you can brighten their holidays by giving them a gift. The work they do is often so complicated, yet they make it look easy....
View ArticleAdobe Flash Stops on December 31, 2020. Are You Ready?
For more than 20 years, Adobe Flash helped websites deliver video content to your screen. However, attackers use Flash to inject ransomware and other malicious code into computers. The bad actors are...
View ArticleInformation that You Need to Know About the California Consumer Privacy Act
California’s CCPA act went into effect on January 1, but you have until July 1, 2020 when it is enforced. Get started now. First, you need to Add a footer to all of your web pages to the effect of “The...
View ArticleExecutives Appreciate it when IT Professionals Communicate Effectively
Today, an IT Guru called to gather more information as he prepared to meet with his executives. His methodology was impressive, and executives might want to forward this to your IT professionals. IT...
View ArticlePrepare Your Organization for a Reaction to Coronavirus
The city of San Francisco just declared a state of emergency over the Coronavirus. Other cities will follow suit – maybe yours. I’m in San Francisco right now at the RSA cybersecurity conference. Hand...
View ArticleRecommendations for Cybersecurity for Remote Workers During Coronavirus
The rapidly changing situation of potential school closures, self-quarantines, and public reaction to the coronavirus guarantees that at some point you will have employees who need to work from home....
View ArticleAlert Your Team – USB Devices, Login Prompts, and Apps
Warn your users about three ways attackers continue to exploit the COVID-19 crisis: USB: A new ploy is bad actors mailing USB devices, appearing to be from your company to your users. Once plugged in,...
View ArticleFollow Along to Set Zoom Security Settings
This video is for non-technical people who need to make Zoom more secure today. So, if that’s you, open up your zoom account settings on your screen, and keep this video where you can see it...
View ArticleZoom Security Issues – Protect Yourself
Every business is concerned and should be, about cybersecurity during online meetings. Due to its popularity, Zoom is an attractive target for the bad actors. There are hundreds, maybe more, people...
View ArticleZoom Security Settings – The Concise Details
Zoom has many security settings. This is a detailed but concise guide to the settings and how they work. Fasten your seatbelt. There are lots of security settings in Zoom. You must change default...
View ArticleZoom Security – Set Up Two-Step Login
Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you. This video walks you through setting up the two step login...
View ArticleVideo Conferencing – Avoid Installing Meeting Programs When Possible
CEOs and Executives: Avoid installing video conferencing software on your computer just because some other company tells you to. When you launch video conferencing programs, many of them ask you to...
View ArticleTwo Tips to Make Your Online Meetings Better
Everyone is concerned about video conferencing security, and they should be. But when the hardware and software are not working right, safety seems like a distraction. Use at least two monitors. You...
View ArticlePower Down to Boost Security
One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don’t want to power it down, at least disconnect from your network. You’ll make your...
View ArticleYour Work From Home Users are Like a Box of Chocolates
Because of so many work from home users, the Internet is like a box of chocolates for attackers. Step 1: Attackers compromise work-from-home users. Step 2: They gain access to their company. Step 3:...
View Article