What You Want In Cybersecurity Awareness Training

employee_training_436x270Research shows that over 90% of network breaches happen when an employee falls prey to a phishing email, clicking on the offered link or opening a file attachment, becoming infected with a remote access Trojan, and creating an entry point for the attacker.  If only we could get people to stop falling for phishing emails!

This is really not such a hard thing to do.  Most ...

Continue Reading →
0

Sunday Funnies: Lost in Translation

Thanks to QZ.com (The insults in other languages that sound the strangest in English) for these nuggets.  Inspired by cjmerc39’s Reddit post.

  1. Vai a quel paese (Italian)
    Literally: Go to that country.
    Means: Go to hell.
  2. China, I’m going to donner you (South African English)
    Literally: Friend, I’m going to thunder you.
    Means: I’m going to beat you up.
  3. Anda a ver si el gallo puso (Venezuelan Spanish)
    Literally: Go see if the rooster laid an egg.
    Means: Go away, stop bothering me.
  4. Estás ...
Continue Reading →
0

Smartphone and Tablet Security Solutions

smartphone-securityOn Wednesday we discussed the many, many ways your smartphone is vulnerable to attack.  Today we will look at solutions.  Smart mobile devices need to be secured just as you would a laptop or desktop computer  The small size and easy portability of smartphones and tablets make them easier to steal or lose.  Some of our recommendations:

  • Record the electronic serial number (ESN) of your phone or tablet. This is information you ...
Continue Reading →
1

Your Smartphone and Tablet Need Security Too

phone-thiefMobile smart devices have all the capabilities of a laptop or computer.  What this means from a cybersecurity perspective is that they are every bit as vulnerable as a laptop or desktop computer.  The fact that they are small makes them easy for a thief to slip in a pocket or backpack and carry away, along with your personal information, contacts, pictures, geo-location history, and a raft of critical and revealing ...

Continue Reading →
0

Does Windows 10 Violate HIPAA, GLBA, and SOX?

Win10-securityMicrosoft has made Windows 10 one of the most highly personalized and cloud integrated operating systems ever, and this may introduce new security risks into using your computer.  They do this by keeping track of what you do, where you go an the Internet, and what you are typing.  This is how features such as Cortana get to know your preferences, and begin to make suggestions.  Microsoft says this information is ...

Continue Reading →
0

Bing Bans Online Tech Support Ads

call center_sI am always mystified when clients of mine fall for fake tech support phone calls or browser pop-ups.  Didn’t their Mom tell them not to talk to strangers?  After all, they are my clients, shouldn’t they be calling me FIRST?

Naked Security reported on May 13th that Microsoft’s search service, Bing, will no longer accept advertising for online tech support companies.  This is good news for everyone except the legitimate computer ...

Continue Reading →
0
Page 196 of 278 «...170180190194195196197198...»