Spending too much money on ink cartridges? Check out this hack from Pinterest.
Continue Reading →JUL
Spending too much money on ink cartridges? Check out this hack from Pinterest.
Continue Reading →
A quick Saturday digest of cybersecurity news articles from other sources.
One of my IT associates got an email that had one of her actual passwords in it, and threatened to reveal information unless she paid a ransom in Bitcoin. This seems to be getting a lot of traction, so beware. Do not pay the extortion demand. First, this is a scam. They ...
Continue Reading →
According to Quora, “The term freelance (noun) was coined by Sir Walter Scott in Ivanhoe (1820). It literally stands for a free lance, signifying a medieval mercenary whose lance is currently not engaged in war and therefore free for being dispatched.” So if you are a freelancer, you are sort of a hired gun, like Richard Boone was as Paladin in the 1957-1963 TV series Have Gun ...
Your network is secure, your computer is up and running, and your printer is jam-free. Why? Because you’ve got an awesome sysadmin (or maybe a whole IT department) keeping your business up and running. So say IT loud; say IT proud …
Wait… what exactly is SysAdmin Day? Oh, it’s only the single greatest 24 hours on the planet… and pretty much the most important holiday of the year. It’s also ...
Continue Reading →
With the expanded use of wireless networks connecting business computers, home computers, smartphone and tablets, and the ever expanding list of smart IoT devices, strong wireless network security is more important than ever. Fortunately there is a new wireless security protocol, WPA3, that will fix some of the weaknesses inherent in the current standard, WPA2.
Wireless security is all ...
Continue Reading →This alert comes from US-CERT. For a detailed description and detection/prevention information, please see their website.
Since the Equifax breach, we have all become painfully aware that our personal credit information is in the wild. Identity theft is something that could happen to any of us. Even the FBI, in a recently released report, says, “Given the hacks we’ve seen in recent years, there are few people who haven’t had their identity stolen.”
There is little any of us can do about the information ...
Continue Reading →
A quick Saturday digest of cybersecurity news articles from other sources.07/19/2018 05:08 PM EDT Original release date: July 19, 2018
NCCIC will conduct a series of webinars on Russian government cyber activity against critical infrastructure (as detailed in NCCIC Alert TA18-074A), which will ...
Continue Reading →
What devices are targeted for crypto-jacking and how can you protect yourself and your business from the problems and losses associated with crypto-jacking? Yesterday we learned about crypto-currency, crypto-mining, and crypto-jacking. Today we will learn how to secure our computers, devices, and networks from this new exploit.
Target devices. Really, any device with a network connection and a CPU is vulnerable ...
Continue Reading →