Happy Thanksgiving From WyzGuys

The Christmas shopping season opens today.  Black Friday, Plaid Friday, Small Business Saturday, Cyber Monday.  28 shopping days until Christmas.

In this day of excessive commercialism, and the never ending retail encroachment on our Thanksgiving holiday traditions, whatever those are for you, we wish you a happy Thanksgiving day filled with family, feasting, and football.  If you are one of those who will be shopping today, be sure to wish a happy Thanksgiving on those less fortunate, and I mean the ...

Continue Reading →
0

Employees A Cyber-Threat? FBI Says Yes

We have talked at length about how your employees may be inadvertently opening the door to cyber attacks by clicking on links and opening attachments in email.  But could your employees be actively and purposefully looking to sabotage your network and steal intellectual property, or financial assets over your own computer network.  The FBI recently released information about insider threats and the effects on businesses.  The report said:

A review of recent FBI cyber investigations revealed victim businesses incur ...

Continue Reading →
0

Small Business Cybersecurity Checklist Part 3- Further Considerations

In the first and second posts of this three post series, we looked at the essentials “must-haves” of small business cybersecurity, and then at a more advanced list of “better-haves.”  In this final post we will look at some advanced concepts and planning that typically are part of the cybersecurity process at larger enterprises. For a small business owner, this may seem like a lot to go through, but again, working with a cybersecurity professional or firm that specializes in ...

Continue Reading →
0

Small Business Cybersecurity Checklist Part 2-Recommended Additions

In our last post we looked at the eleven must have items that a company ought to have in place to meet the bare minimum of cybersecurity essentials.  In today’s post we are looking at another ten highly recommended cybersecurity practices.

  • Beware of emails bearing links or attachments, or that are requesting personal information, user credentials, or credit card or banking information.  It is a good practice to call the sender to confirm the contents on any attachment or the destination ...
Continue Reading →
0

Small Business Cybersecurity Checklist Part 1–Bare Minimum

Small businesses and organizations are generally lagging behind their enterprise sized counterparts when it comes to cybersecurity.  Over the next three posts we will look at the actions small business owners and managers should undertake to security their digital assets.

A large part of the reason that small businesses are lagging in cyber security is due to the fact that small owner-managed businesses are generally focusing time, energy, and capital resources at the core purpose of their business:  selling more of ...

Continue Reading →
0

Sunday Funnies: Interstellar Rapper “ChugGer”

So the Rosetta spacecraft has successfully mated with Comet 67P/Churyumov-Gerasimenko (aka ChugGer).  Well except for the part where the lander is in a shadow and the solar panels are not getting enough light to charge the battery.  Oopsy!  One of the many interesting new things we are learning is that this particular comet is “singing.”  And they said “in space no one can here you scream.”  I guess not.  Anyway, ...

Continue Reading →
0

Lets Go Phishing–5 Steps To Empty Your Bank Account

Cybercriminals have lots of ways to exploit their victims, but the single most effect method to gain initial entry remains the phishing email.  If you want to protect yourself from these sorts of exploits you need to know what they look like and what happens if they trick you into responding.  Let’s take a look at a scenario where the bad guys are trying to get your online banking credentials.

  • Step 1:  Cybercriminals will send out a realistic looking but fake ...
Continue Reading →
0

Cybersecurity: What’s Left – Avoidance, Prevention, Detection and Removal

On the Internet, as in real life, there are basically three ways to stay out of trouble, or at least get out of trouble.  They are avoidance, prevention, and then detection and removal.

  • Avoidance – this is actually the easiest and best solution to cybersecurity.  Learn what trouble looks like, and avoid contact.  If you want to avoid malware intrusions, learn how to recognize clever phishing emails and resist the urge to click on a link or open a file attachment ...
Continue Reading →
0

Researchers Discover 17,000 Macs in a Botnet

Image result for apple logoPeople who use Apple computers operate under the assumption that they are invulnerable to malware attacks.  This information is reinforced by the Geniuses at the Apple Store, or so I have been told by more than one of my Mac-based clients.  But we have been warning for several years now that this is no longer true.  This must ...

Continue Reading →
0
Page 223 of 272 «...200210220221222223224225...»