by Mike Foster | Sep 19, 2017 | Best Practices, CCleaner, Cyber Security Breach, Cybersecurity, Executive Tips, IT Best Practices, Security Breach, Technology Safety Tips, Uninstall
Can you trust programs you download? Millions of users, including outsourced computer firms, use a program called CCleaner on their own and on customers’ computers. CCleaner just announced that some of its software was compromised and has been stealing data from...
by Mike Foster | Sep 18, 2017 | Best Practices, Credit Bureaus, Credit Freeze, Cyber Security Breach, Cybersecurity, Equifax, Technology Safety Tips
Regarding the Equifax breach, the breach affects about half of America’s population, so take action. Experts agree that one of the best things you can do to protect yourself is to place a credit freeze on your credit reports.Credit monitoring is nice because it can...
by Mike Foster | Sep 8, 2017 | Alerts, Credit Freeze, Cyber Security, Cyber Security Breach, Cybersecurity, Equifax, Family Cyber Safety, FTC, Identity Theft, Security Breach, Stolen Data, Website Security
You may be one of the 143 million people affected by the Equifax hacking breach that was announced yesterday. Data stolen may include contact information, dates of birth, driver’s license information, and Social Security numbers. Attackers can make money selling the...
by Mike Foster | Sep 5, 2017 | Best Practices, Cybersecurity, NIST, NIST Recommendations, password, Password Safety, Password Security
NIST, the National Institute of Standards and Technology in the US, is releasing new password standards that make passwords so much easier… Using plain letters is enough; numbers and symbols are optional. Passwords need to be long, at least 8 characters. 16 or more is...
by Mike Foster | Aug 29, 2017 | Adobe Flash, browser security, Cybersecurity, Family Cyber Safety, hotspot safety, IT Best Practices, java, Student Cyber Security, Technology Safety Tips
School is starting again and many students need computers. Take these important steps to help make them more secure:In addition to how they back up now, they also need to perform image backups that will back up everything, even programs, so that restore operations can...