Wishing you and yours a very merry Christmas and a Happy New Year.
If you want a bit more, check out this post on TechDirt about unusual Christmas traditions.
One of the security practices that I am always looking for is two-factor or multi-factor authentication. This is when you need a user name, a password, and a special code or device to provide the second authentication factor.
I have been using Google Authenticator with my extensive set Google accounts and with the password manager LastPass. I was happy to learn that I can ...
Continue Reading →DEC
Adobe’s Flash program has been a security nightmare. A favorite among malware writers for ages, Flash is useful for doing things like creating fake security pop-up alerts and conning computer users into buying security programs that don’t work and carry malicious content. And it seems that there is another “zero-day” vulnerability discovered every three days.
Do we really need Flash? No we don’t. iPhones and ...
Continue Reading →DEC
From BuzzFeed – 28 Of The Greatest Moments In The History Of Parenting
Here are two of my favorites. Click on the pictures below to see all 28 ideas – these are priceless.
If you or your company is still using Internet Explorer 10 or older versions of IE, then it is important that you move to IE11 (at a minimum) before January 12 2016. Microsoft will officially end support for browser products older than Internet Explorer 11. Many businesses are using older versions of IE to provide compatibility with older line-of-business and internal web applications. If you are not updating those ...
Continue Reading →DEC
I am a big adherent of Gibb’s Rule 13, “Never, ever involve lawyers.” Unfortunately, if your business suffers a data breach, Rule 13 goes out the window. You will be sued. Count on it.
But here are some things that you should do to protect yourself and your business from the worst legal repercussions:
- Have a plan – If you have a ...
DEC
Hacktivism is an electronic form of civil disobedience. These cyber-attacks are instigated for reasons that are political, economic, or based in civil rights, liberty, freedom, or social justice. In nearly every case, these attacks are illegal. But does that make them a bad thing?
As the saying goes, “one man’s terrorist is another man’s freedom fighter.” Looking back on our own national history, the men who we fondly refer to as ...
Continue Reading →DEC
Need some last minute tech gifts for your favorite tech, geek, or nerd? Let me introduce you to The Grommet. They have the perfect gift for the person who wants to really know what the check engine light is really trying to tell him or her. The Automatic App Fueled Car Diagnostic is just the thing. Just plug it into the diagnostic link connector under the dash, and check the smartphone app for more detailed information. ...
Continue Reading →DEC
There has been a running battle on the subject of copyright in the digital age, between content creators and their customers, the content consumers. The doctrine of Fair Use has protected consumers who engage in making copies of protected works for their own use or for backup purposes. The content creators and the companies and lawyers that serve them have been trying to reduce or restrict the doctrine of fair ...
Continue Reading →DEC
Just received an email from WordFence, the WordPress security plugin-developer, that popular WordPress hosting company WPEngine had a breach that may have included customer user name and password information. The full text of the email I received follows.
Continue Reading →“We learned about an hour ago that there has been a data breach at WPEngine. Some of their customer login credentials have been exposed. ...
DEC