Our email address today has become the equivalent of our social security number in many ways. A majority of Internet sites today use a person’s email address as their username. Think about how many sites you access on a regular basis with your email address: Social media sites such as Facebook or LinkedIn Online payment […]
January 31, 2017
Imagine the following scenario. You go to your bank’s online website such as www.safebank.com to check your account balance and perhaps pay some bills. In the process you inadvertently type www.safebakn.com as a spelling error (note the backwards placement of the “k” and the “n”) and not notice it because the usual website is displayed […]
December 2, 2016
We all know that HTTPS and SSL stand for security and encryption. When we connect to our bank or favorite ne retailer we know we can upload our credit card information or account number with confidence, knowing that our data is being shielded from prying eyes. But that shield cuts both ways as cyber criminals […]
December 1, 2016
In an article in Forbes Magazine dated July 15, 2016, a new crypto application called Stampado is being sold on the dark web for $39, targeting buyers who want to make ransom money without having to write any code. With revenues of over $18 million dollars in 2015, ransomware continues to be the fastest growing […]
November 29, 2016
If you’re like most IT professionals today, you have a million things to do and a short window of time to get them done, so in order to alleviate our endless load, we sometimes implement out of convenience rather than according to good policy. Unfortunately, the measures we takeout of convenience today can end up […]
November 17, 2016
As a network admin, there’s several dialogs we find ourselves repeating over and over again when it comes to advising our users such as “don’t click a link in an email unless you are absolutely positive what it is.” (And even then you should click with complete apprehension). Another is cautioning users to utilize public […]
October 13, 2016
As a network admin, there’s several dialogs we find ourselves repeating over and over again when it comes to advising our users such as “don’t click a link in an email unless you are absolutely positive what it is.” (And even then you should click with complete apprehension). Another is cautioning users to utilize public […]
September 1, 2016
As a Windows domain administrator, we all depend on Group Policy to deliver configuration settings such as: · Security settings such as password and lockout policies · The correct display settings for the designated machine · The method in which Windows Updates will be delivered · Power management settings for portable devices We can also […]
August 10, 2016
Ransomware has caused a lot of chaos and damage to networks across the globe. It has also brought a lot of attention and awareness to endpoint protection and network security. There are a number of security tools that can accentuate your efforts to protect your users and data from this prevailing menace. Last month we […]
April 20, 2016
Think Like a Cyber Attacker Put yourself in the mindset of a cybercriminal for a moment. You’ve been targeting personal computer devices and phones up to now with ransomware making some fast bucks here and there but you want to go after a bigger target on a grander scale. You want a quick but sizable […]
March 7, 2017
0