- Security is generally a waste of time and money.
- I am too small or uninteresting to be a target of a cyber crime.
- Passwords are a hassle, so I keep them short and easy to remember.
- I like to use the same password ...
I recently gave a presentation titled “Email Security – Resist That Click” on May 23 2017 at the Phipps Theatre in Hudson WI. This event was sponsored by First State Bank and Trust of Bayport MN. I was also asked to present this topic at the MnCCC Conference (Minnesota Counties Computer Consortium) in Alexandria MN on Wednesday June 7, 2017. This presentation was titled “The War for Tour Inbox.”
First State Bank and Trust had my presentation video recorded, and it ...Continue Reading →
As we approach year-end, many small and medium sized business owners and managers are coming to the realization that their best intentions for creating a cybersecurity program in their organization have fallen short. This was the year, you promised yourself, that we get a handle on computer and network security.
Well it is not too late to get a start, and here is a short ...Continue Reading →
On Wednesday we looked at several of the important takeaways from this year’s Cyber Security Summit. Here are a few more.
A couple of weeks ago I attended the Minneapolis Cyber Security Summit 2016 at the J.W. Marriot Hotel in Bloomington Minnesota. There were two days of presentations on cybersecurity issues, and here are a few of the takeaways for small and medium sized business owners.
Not trying to be rude here. Phishing has become the most prevalent form of cyber-attack, and the reason for that is that IT WORKS! It works because most people are very trusting and easily convinced, and are clicking on links and opening attachments without much concern. It also works because most people have not been trained how to recognize a potential phishing message, and how to verify if the ...Continue Reading →
Research shows that over 90% of network breaches happen when an employee falls prey to a phishing email, clicking on the offered link or opening a file attachment, becoming infected with a remote access Trojan, and creating an entry point for the attacker. If only we could get people to stop falling for phishing emails!
This is really not such a hard thing to do. Most ...Continue Reading →
On Wednesday we discussed the many, many ways your smartphone is vulnerable to attack. Today we will look at solutions. Smart mobile devices need to be secured just as you would a laptop or desktop computer The small size and easy portability of smartphones and tablets make them easier to steal or lose. Some of our recommendations:
Although my very first PC user experience was on an Apple IIe back in 1984, I have really been a Windows guy for the most part. Got on my first Windows PC back around 1991, and bought my first Windows PC (Windows 3.11) in 1994. I do have an iMac in my current computer collection. But lately I have been playing around more and more in the Linux platform, both Ubuntu and, ...Continue Reading →