Security Improved in IOS 9

applelogoApple introduced IOS 9 recently and it is full of security improvements that matter.  You should upgrade if you haven’t already.  They include:

  • Passcodes increased from 4 digit to 6 digit PINs, which is 10,000 time stronger.
  • Two-factor authentication (2FA) for supported devices. Not all are, which is too bad.
  • Changes to the Apple Store to key annoying app vendors from bombarding you with crossgrade ads on products ...
Continue Reading →
0

Jeb Bush Defends NSA

jeb-bush-550Back on Sept 18 we criticized presidential candidate Jeb Bush, FBI Director James Comey, and other politicians for complaining that encryption was making it too hard to fight the “evil doers” and suggesting that some sort of “master key” or “backdoor” was needed by law enforcement and intelligence services to do their jobs.  We of course disagreed.

Around the same time ...

Continue Reading →
0

How To Catch a Phish

No-PhishingThe number one method used by cyber-criminals to infect your PC with malware is the phishing email. Today we will show you how to check out suspicious emails yourself.   These cleverly designed emails encourage you to open an attachment or click on and website link in order to download and install their malicious applications and exploits.  I recently received the email below, and as an exercise, checked it out ...

Continue Reading →
0

WyzGuys + CIT = Better Cybersecurity

CIT-logoThis post is to inform you of some exciting news:  WyzGuys has become part of Computer Integration Technologies, Inc. (CIT), Inc. a technology solutions organization based in Woodbury, Minnesota.

Over the last few months, I’ve been in discussions with CIT personnel, and have found them to be a solid and reliable IT resource.  Joining CIT was a natural next step in furthering my goal to significantly enhance the services and expertise ...

Continue Reading →
0

Sunday Funnies: Passwords, Of Course

sharky-150-100393005-bylineHey – continuing on our theme, here is another fun article from Shark Tank.

No Good Password Goes Unpunished

Consultant pilot fish is paying his bills online, but for some reason his health insurance company’s website won’t let him log in.

 “I tried twice, and it rejected either my user name or my password both times,” fish says. “It also warned me I’d be locked out after a third try, ...
Continue Reading →
0

Password Strategy Part 3

password2Today we wrap up our review of the new password document from the GCHQ, Password Guidance: Simplifying Your Approach.

Administrator and Remote User Accounts

These two classes of user accounts represent the gold standard for attackers, the administrator account for a system, server, or network, and a remote access account.

Administrator accounts grant the user total authority to a device or network. Administrator accounts should ...

Continue Reading →
0
Page 2 of 2 12