Jeb Bush Defends NSA

jeb-bush-550Back on Sept 18 we criticized presidential candidate Jeb Bush, FBI Director James Comey, and other politicians for complaining that encryption was making it too hard to fight the “evil doers” and suggesting that some sort of “master key” or “backdoor” was needed by law enforcement and intelligence services to do their jobs.  We of course disagreed.

Around the same time ...

Continue Reading →
0

How To Catch a Phish

No-PhishingThe number one method used by cyber-criminals to infect your PC with malware is the phishing email. Today we will show you how to check out suspicious emails yourself.   These cleverly designed emails encourage you to open an attachment or click on and website link in order to download and install their malicious applications and exploits.  I recently received the email below, and as an exercise, checked it out ...

Continue Reading →
0

WyzGuys + CIT = Better Cybersecurity

CIT-logoThis post is to inform you of some exciting news:  WyzGuys has become part of Computer Integration Technologies, Inc. (CIT), Inc. a technology solutions organization based in Woodbury, Minnesota.

Over the last few months, I’ve been in discussions with CIT personnel, and have found them to be a solid and reliable IT resource.  Joining CIT was a natural next step in furthering my goal to significantly enhance the services and expertise ...

Continue Reading →
0

Sunday Funnies: Passwords, Of Course

sharky-150-100393005-bylineHey – continuing on our theme, here is another fun article from Shark Tank.

No Good Password Goes Unpunished

Consultant pilot fish is paying his bills online, but for some reason his health insurance company’s website won’t let him log in.

 “I tried twice, and it rejected either my user name or my password both times,” fish says. “It also warned me I’d be locked out after a third try, ...
Continue Reading →
0

Password Strategy Part 3

password2Today we wrap up our review of the new password document from the GCHQ, Password Guidance: Simplifying Your Approach.

Administrator and Remote User Accounts

These two classes of user accounts represent the gold standard for attackers, the administrator account for a system, server, or network, and a remote access account.

Administrator accounts grant the user total authority to a device or network. Administrator accounts should ...

Continue Reading →
0

Password Strategy Part 2

password1In our last article we recommended a publication from the GCHQ on passwords, and today we continue that discussion.  Many of the recommendations are suggestions we have covered before in previous posts, but the importance of having secure password procedures can not be overstated.

Change all default passwords

All of our network connected devices come “ready to go” right out of the box in ...

Continue Reading →
0

Password Strategy Part 1

passwordToday we start a three article series on developing good password strategy for you small business.  As it happens, there is a great resource available courtesy of Her Majesty’s Government.  The British signals intelligence department, GCHQ, has published a guide to password policy entitled Password Guidance: Simplifying Your Approach.  This 12 page guide offers password advise in seven sections.  They are:

  • Change all default passwords on devices that you deploy ...
Continue Reading →
0

Sunday Funnies: Rage Against The Machine 2

Dateline Tokyo – Drunken phone store patron kicks Pepper the Robot.

pepper-the-robotWhat is going on?  Here is another story of human on android violence.  I have to admit, I find this stuff disturbing.  I am sure most people just see an object, a thing, and that this sort of violence is no different from throwing your golf club into the lake during a particularly frustrating round of golf.  But for me, ...

Continue Reading →
0
Page 207 of 273 «...180190200205206207208209...»