by Mike Foster | Sep 2, 2021 | Cybersecurity, Cybersecurity Audits, Family Cyber Safety, Ransomware
Attackers Scan Your Network for These Folder Names Once attackers gain access to a network, before they make themselves known, they explore your files to Locate cyber insurance policies to determine what your coverage limits are.Find financial statements to determine...
by Mike Foster | Aug 27, 2021 | Cybersecurity, Family Security, Hacking, Ransomware
What if the attackers: Hack your organization’s network, thenHack your remote workers’ work computers, and thenUse the remote workers’ work computers to encrypt all the computers in the worker’s family household? That could mean that all of...
by Mike Foster | Aug 20, 2021 | Cybersecurity, Cybersecurity Audits, Wireless Security
Businesses sometimes have air conditioning systems, light controllers, music, VoIP phones, and similar devices connected to their network. If an attacker successfully breaks into any of those devices, the attacker can use them as a platform to launch attacks against...
by Mike Foster | Aug 13, 2021 | Cybersecurity, Cybersecurity Audits, Supporting IT Professionals, Uncategorized
Tell your IT provider, or internal IT team, that you want them to isolate or filter the VPN connections. At least discuss this security step with them. If any users connect via VPN to your office, be sure your IT team isolates or filters the data that travels from the...
by Mike Foster | Jul 30, 2021 | Cybersecurity, Hacking, Ransomware
If you get ransomware that encrypts your files and restoring your backups doesn’t work, try this: Go to www.nomoreransom.org/crypto-sheriff.php and upload two of your encrypted files. The site will analyze the files to determine if it has a tool that can decrypt...