ARCHIVED BLOG POSTS
2016
1
Comments
Small businesses are hardly immune to attacks by hackers. The illusion of low attack risks comes from the publicity that only huge corporations get when they are breached, like Target, Sony and Anthem. These are giants, so of course it makes headline news. But when a “ma and pa” business gets att...
12/29/2016
11
Comments
Leave personal details off your Facebook page.Does the whole world—or even your private circle, many of whom you haven’t seen in person for years, or even at all—have to know you’re laid up from hernia surgery (i.e., vulnerable, defenseless)?Try this experiment for a week: Assume that the only vi...
12/27/2016
5
Comments
Recently, says a report at wired.com, it’s been unveiled that the obscure Israel-based NSO Group has been selling spyware delivered to smartphones through vulnerabilities in Apple’s iOS operating system.“Pegasus” spyware can put a surveillance out on nearly everything including keystrokes, e-mail...
12/22/2016
3
Comments
You shouldn’t leave any digital trace of yourself after you leave a job. Hopefully, you’ll be leaving voluntarily and thus have the time to first make backups before you delete anything. This may seem easy, but you need to take inventory to make sure you get EVERYTHING.Note: make sure that every ...
12/20/2016
12
Comments
#1. Keep everything up to date. You know those annoying popups telling you updates are available? Do you ever click out of them? Don’t. Always update at the time these appear.#2. Two-step verification. Two-step verification or authentication should be set up for all your accounts that offer it. A...
12/15/2016
5
Comments
Who needs a hanger to steal a car when you can use a laptop? Despite today’s vehicles having far more sophisticated security protection, thieves can still break in—like the two crooks who stole at least 30 Dodge and Jeep vehicles…with just a laptop computer.In Houston, video showed the pair in th...
12/13/2016
As long as humans sit at computer screens, there will always be infected computers. There’s just no end to people being duped into clicking links that download viruses.A report at theregister.co.uk explains how subjects, unaware they were guinea pigs, fell for a phishing experiment. Subjects were...
12/08/2016
1
Comments
If the super big wigs could get their social media accounts hacked, you can too. If you can believe it, the Twitter accounts of the following were recently hacked: Google CEO Sundar Pichai Yahoo CEO Marissa Mayer Oculus CEO Brendan Iribe Twitter co-founder Jack Dorsey Shouldn’t these CEOs know ho...
12/06/2016
15
Comments
If you were to design the ultimate security system for a house, what would you focus on? These days, many people would immediately think in terms of the most technologically advanced alarm system—one that’s voice activated, detects motion anywhere, can be remotely controlled and allows remote vie...
12/01/2016
4
Comments
Trick e-mail = fraudulent wire transfer = hundreds of thousands to millions of dollars stolen.That’s what’s happening with business executives in select industries (e.g., chemical operations, manufacturing), says a report at threatpost.com, citing a finding from Dell SecureWorks.The phishing e-ma...
12/01/2016