by Mike Foster | Jan 23, 2018 | Adobe, Adobe Flash, Applying IT Patches, Best Practices, Cybersecurity, Patch Updates, Patches, Preventative IT Security Breach, Technology Safety Tips
Intel says, again, to stop deploying patches. Java and other new patches need handling. Intel advises that IT Professionals stop deploying the current versions of patches for the recently discovered security flaws in CPU chips. Find details, just updated, by...
by Mike Foster | Jan 18, 2018 | Alerts, Backup, Best Practices, CCleaner, Cloud Security, Cyber Security, Cybersecurity, Data Loss Prevention, Data Restoration, Disaster Recovery, IT Best Practices
First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way, the importance of being able to restore data quickly. Downtime can be extremely expensive for some organizations, so...
by Mike Foster | Jan 4, 2018 | Computer Processor, Cybersecurity, Linux Patch, Microsoft Patch
A security vulnerability, that has existed for 10 years, has only recently been discovered. A patch for Linux has been released and Microsoft plans to release a patch next Tuesday. Apple will release a patch for OSX. For understandable reasons, many organizations are...
by Mike Foster | Jan 2, 2018 | Android, Apple, Children, Cyber Security, Cybersecurity, Family Cyber Safety, Security Breach, Technology Safety Tips
Because many families, and business professionals, received new tablets for the holidays, it is important to consider security. Families, as well as businesses, may choose to restrict permissions on devices. Here’s how: Set a passcode on the device. Even a 4-digit...
by Mike Foster | Dec 21, 2017 | Alerts, Best Practices, Cyber Security Breach, Cybersecurity, Executive Tips, Ransomware, Service Provider Breach
First, the attacker population is outpacing the ability to control them. Attacks are trending higher at an ever-increasing rate. Be extra security-diligent. Second, ransomware, software that prevents you from accessing your information until you pay a ransom,...