Another election year. Use your vote carefully. Vote early, vote often. Remember, a vote for a third party candidate is just like “none of the above.”
Thanks to my Uncle Ron, I have an example of politics in action for your amusement.
So I told my son “I want you to marry a girl of my choice!”
He said “NO!”
I told him its Bill Gates daughter!!!!
He said “OKAY!”
Got in contact with Bill Gates & told him “I want your daughter to marry my son!”
He said “NO!”
I Told him ...
Continue Reading →AUG

Many small businesses are being dragged into the arena of IT risk assessment by larger client companies, suppliers, or regulators. Common scenarios include credit card (PCI) or HIPAA compliance. Since the Target breach, smaller vendors and supplier companies who have a network connection into the IT operations of a larger company are being required to undergo the same sort of vulnerability and risk assessment procedures ...
Cyber-criminals are encrypting your computer files and holding them for ransom. This is one of the most difficult attacks to defend, and once encrypted, impossible to overcome without paying for the decryption key. There are several new tactics appearing on the crypto-ransomware scene that we thought were worth a mention.
Today is the 17th anniversary of the first
Having just discussed phishing on Monday, it makes sense to cover the social engineering practice called “baiting” today. Typically, this involves an attacker leaving removable media such as a USB flash drive or SD Media card lying around in a public location. The exploit depends entirely on the principle of “finders-keepers.” People pick these drives up, and plug them into the first computer ...
We continue to hear from security researchers and professionals that an astonishing 95% of all exploits begin with someone opening an attachment or clicking a link on a phishing email. I have a client where two different employees opened the attachment on an email from “FedEx” and became infected with crypto-malware. These incidents happened nearly a week apart, and you think that the ...
I discovered a while ago that my LG smart phone can be used fairly easily to make a surreptitious video of a meeting simply by turning on the video camera and slipping the phone into a shirt pocket. The camera lens clears the edge of the pocket nicely, and there is no indication, at least on my phone, the the camera is rolling. This is a great way to keep a record ...