Protecting Your Credentials With A Password Manager


From capital letters to punctuation and numbers, most sites require long and complex passwords to best protect user information. While the benefits of added security are understandable, trying to keep track of the complicated passwords used across dozens of websites and applications can be easier said than done. Studies estimate that the average business user has 191 passwords to keep straight.

For those who struggle to manage passwords across dozens of sites, a password manager can be an excellent ...

Continue Reading →

Friday Phish Fry

Phishing Email Alerts

Catch of the Day: Code of Conduct Phish
Chef’s Special:  Invoice Phish 

Examples of clever phish that made it past my spam filters and into my inbox. Some are send by clients or readers like you, and other reliable sources on the Internet.

You can send phishing samples to me at

My intention is to provide a warning and show current examples ...

Continue Reading →

Encryption can be a mind bender – Part 2

By Bob Weiss

If you missed Part 1 of this article, it can be found at last week’s post on May 5

Hybrid Cryptography

When we use two or more cryptographic methods together, it is called Hybrid Cryptography.  Common forms of Hybrid Cryptography included the creation and sharing of Symmetric session keys, through using Asymmetric Encryption.

Not all key exchange methods require using the PKI.  Diffey-Helman, Oakley and other non-PKI key ...

Continue Reading →

Using Zoom Conference Rooms

By Joey Pepka of Peptronics

[Editor comments: I feel like we all have become experts on using conferencing applications such as Zoom, Teams, and WebEx.  I had an opportunity last moth to participate in a Zoom session that used breakout rooms, thanks to Jackie Mene at Micro Business Alliance.  Joey’s article just seemed to hit a point where many of us ...

Continue Reading →
Page 1 of 232 12345...»