Browsing All Posts filed under »IT Security«

Your Password and Your Email are the Weakest Links in Personal Cyber Security

March 7, 2017

0

Our email address today has become the equivalent of our social security number in many ways.  A majority of Internet sites today use a person’s email address as their username.  Think about how many sites you access on a regular basis with your email address: Social media sites such as Facebook or LinkedIn Online payment […]

How to Protect Yourself from Typosquatting Attacks

January 31, 2017

0

Imagine the following scenario.  You go to your bank’s online website such as www.safebank.com to check your account balance and perhaps pay some bills.  In the process you inadvertently type www.safebakn.com as a spelling error (note the backwards placement of the “k” and the “n”) and not notice it because the usual website is displayed […]

HTTPS and SSL is a Two Edged Sword

December 2, 2016

0

We all know that HTTPS and SSL stand for security and encryption.  When we connect to our bank or favorite ne retailer we know we can upload our credit card information or account number with confidence, knowing that our data is being shielded from prying eyes.  But that shield cuts both ways as cyber criminals […]

Using Local Security Policy and Group Policy to Fight Ransomware

December 1, 2016

0

In an article in Forbes Magazine dated July 15, 2016, a new crypto application called Stampado is being sold on the dark web for $39, targeting buyers who want to make ransom money without having to write any code.  With revenues of over $18 million dollars in 2015, ransomware continues to be the fastest growing […]

5 Security Measures to Protect Client Devices that are Worth the Trouble

November 29, 2016

0

If you’re like most IT professionals today, you have a million things to do and a short window of time to get them done, so in order to alleviate our endless load, we sometimes implement out of convenience rather than according to good policy.  Unfortunately, the measures we takeout of convenience today can end up […]

6 Ways Reduce the Risk of Open Public WiFi

November 17, 2016

0

As a network admin, there’s several dialogs we find ourselves repeating over and over again when it comes to advising our users such as “don’t click a link in an email unless you are absolutely positive what it is.”  (And even then you should click with complete apprehension).  Another is cautioning users to utilize public […]

6 Ways Reduce the Risk of Open Public WiFi

October 13, 2016

0

As a network admin, there’s several dialogs we find ourselves repeating over and over again when it comes to advising our users such as “don’t click a link in an email unless you are absolutely positive what it is.”  (And even then you should click with complete apprehension).  Another is cautioning users to utilize public […]

5 Things You Didn’t Know About Group Policy and Active Directory

September 1, 2016

0

As a Windows domain administrator, we all depend on Group Policy to deliver configuration settings such as: ·        Security settings such as password and lockout policies ·        The correct display settings for the designated machine ·        The method in which Windows Updates will be delivered ·        Power management settings for portable devices We can also […]

Doing this One Thing Will Prevent any Sustained Damage from Ransomware

August 10, 2016

0

Ransomware has caused a lot of chaos and damage to networks across the globe.  It has also brought a lot of attention and awareness to endpoint protection and network security.  There are a number of security tools that can accentuate your efforts to protect your users and data from this prevailing menace.  Last month we […]

Why Hospitals are such a Target Rich Environment for Malware

April 20, 2016

0

Think Like a Cyber Attacker Put yourself in the mindset of a cybercriminal for a moment.  You’ve been targeting personal computer devices and phones up to now with ransomware making some fast bucks here and there but you want to go after a bigger target on a grander scale.   You want a quick but sizable […]