by Mike Foster | Apr 27, 2018 | Best Practices, Clean Browsing, Cybersecurity, DNS, Norton ConnectSafe, Open DNS, Quad9, Technology Safety Tips, Windows
There is a setting on your computer that can help protect your family. You don’t need to know this part: There is a service called Domain Name Service, DNS, that is a massive index for the Internet. If someone in your family, or at work, types in make a wish dot...
by Mike Foster | Apr 18, 2018 | Cyber Security, Cybersecurity, NYC Secure
As the City of Atlanta is still recovering from the massive ransomware attack on March 22, NYC is launching a program that provides secure Internet access for residents and visitors at no charge. NYC’s Mayor Bill de Blasio signed an executive order to establish...
by Mike Foster | Mar 29, 2018 | Best Practices, Cybersecurity, IT Best Practices, IT Pro Tips, Preventative IT Security Breach
Attackers can take advantage of a large attack surface on your servers. Your IT professionals can drastically reduce the attack surface, and potentially save you money. When your IT team logs onto a server, the server’s screen looks similar to what you would...
by Mike Foster | Feb 16, 2018 | Best Practices, Cyber Security, Cybersecurity, IT Best Practices, IT Pro Tips
Imagine a scenario when an IT professional knows there is an urgent security problem in your firewall that needs to be addressed. And at the same time, your multi-function printer is broken. What problem will the IT professional address first? Most IT professionals...
by Mike Foster | Feb 7, 2018 | Best Practices, Cyber Security, Cybersecurity, Data Loss Prevention, IT Best Practices, Programs
It is like someone borrowing your toothbrush without you knowing, and you get sick from their germs. Think of programs on computers as being something that can be used to make you sick. As 2018 continues, more attackers will use trusted software as a vector to infect...