Why the Bruhaha over the Corp.com Domain?

The Corp.com domain is for sale, and depending on who ends up owning it, this could be catastrophic for companies that use Windows domains and Active Directory.  It basically is Microsoft’s fault (of course), except it is not.  The problem is that many admins who were setting up Active Directory domains for their company followed the directions a little too exactly.  In ...

Continue Reading →
1

Who Guards the Guardians?

Insider threats, the risks and dangers caused by malicious or careless acts performed by your own employees, contractors, and trusted vendors is perhaps the most difficult cyber attack to detect and defend.  What happens when a member of your own IT department turns to the dark side?

Between 2015 and 2019, IT executive Hicham Kabbaj scammed his employer out of $6 million dollars for servers, other products, and installation services by ...

Continue Reading →
0

Infographic – The Internet of Hackable Things in Your Daily Life

Today I share an infographic provided by repeat guest poster Siege Media.  The Internet of Things is full of cool new devices that connect to the network and Internet, and can be used from distant locations.  But if used without proper security controls, these smart devices can provide an easy remote entry point for an attacker.

I have not republished the excellent article that was part of the original post, 

Continue Reading →
1

Ransomware Can Kill Your Business

Can a cyber attack force you to go out of business?  Ransomware attacks are causing small business targets of these attacks to close their doors, even after they paid the attackers for the decryption key.  The financial losses and impacts of the attack are just not survivable for some businesses..

In 2019, we saw a dramatic increase in both ...

Continue Reading →
0

Guest Post – How to Use Your Laptop’s Bluetooth Connection Securely

Using Bluetooth to connect devices to your laptop is convenient but also risky. Discover what those risks are and how to minimize them.

Many laptops come with Bluetooth connectivity. Thanks to this wireless technology, you can easily connect a keyboard, mouse, headset, or other peripheral to your laptop. You can even use it to send files to a printer ...

Continue Reading →
0

Staying Private Online Using Popular Browsers

Is there a way to maintain privacy online, and defeat tracking without resorting to extreme measures?  We have written articles recently about the most private browsers, but using them requires changing habits and abandoning web browsers that you are already familiar with.

I came across this graphic on Pinterest, and thought it was worth sharing.  It shows some ...

Continue Reading →
0
Page 28 of 107 «...10202627282930...»