by Mike Foster | Jul 24, 2017 | Cybersecurity, DEF CON, Hacker Insight, Hackers, Hacking Competition
Expect to see an increase in interesting news stories about what can be hacked this week. The big hacker convention DEFCON starts this week and lots of new announcements will be made as part of the program. If you will be in Vegas, leave your laptop and phone at home...
by Mike Foster | Jul 21, 2017 | Acronis True Image, Carbon Copy Cloner, Cyber Security, Cybersecurity, IT Best Practices, Restoring, Security Breach, Shadow Protect Desktop, Technology, Technology Safety, Technology Safety Tips, Technology Tips, Troubleshooting
I was stranded in the Portland airport last night because of a mechanical failure on the first flight. You’ve had similar situations for sure. What would your travel experience be like if the airlines could immediately reset a plane to be brand new if it breaks? With...
by Mike Foster | Jul 14, 2017 | Best Practices, Cyber Security, Cybersecurity, Data Loss Prevention, Disaster Recovery, Home Computers, IT Best Practices, Ransomware, Remote Workers
Ransomware is a common problem. If an attacker encrypts all your files and demands that you pay ransom to unlock your files, you will want to be able to recover quickly. Regular backups are not enough. Regular backups, including file backups, can do a great job of...
by Mike Foster | Jul 3, 2017 | Alerts, Cybersecurity, International Security, Sir Michael Fallon, UK
The UK is preparing to attack hackers with Army, Navy and Air Force. Sir Michael Fallon, the UK’s defense secretary, warned attackers that the UK will hunt them down, and respond not just in cyber-space, but also using air, land, and sea forces. Imagine soldiers,...
by Mike Foster | Jun 28, 2017 | Alerts, Cyber Security, Cyber Security Breach, Cybersecurity, IT Best Practices, Petya, Ransomware, Technology Security
A new strain of Ransomware, dubbed P e t y a, is gaining momentum infecting companies and home users. Worst of all, in addition to holding files ransom until you pay up, it appears to be infiltrating corporate networks to steal usernames and passwords too. Be sure...