- Home
- May 2009
Latest Posts
How are the hackers getting past your firewall?
I get calls from IT Professionals asking what to do when a cybercriminal is trying to log in through the network remotely with a brute force “password guessing” attack. The IT professionals often state they are surprised an outsider could do this “since the firewall was up and running.” I’m used to executives wanting a […]
Continue reading How are the hackers getting past your firewall?Still using just one monitor?
Many users have changed from a single to dual monitors and their productivity has skyrocketed. I have a laptop that has two screens – one slides out when I need it. The extra real estate can make a big difference especially if you work with several applications open simultaneously. As inexpensive as monitors are these […]
Continue reading Still using just one monitor?Portable scanners can help your mobile users
I carry a portable scanner with me everywhere. I can scan in receipts so my capable staff can bill clients. I scan in program evaluations to learn from valuable feedback from audiences where I speak. I scan anything important that I might need again. When I used to collect business cards, I would scan them […]
Continue reading Portable scanners can help your mobile usersThe easiest way to create pdf files
Storing files in the pdf format has many advantages. You can help ensure other users will see your document the way you intended with the right fonts and the page elements all in the “right place.” Pdf documents are not always as easy to change as other files, and that can be a benefit if […]
Continue reading The easiest way to create pdf filesRecent Blog Posts
- A Simple Way to Protect Work From Home Users and Families
- Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks
- Three of the Most Useful Links About the SolarWinds Attack:
- The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.
- Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks
Blog Topics
- Account Lockout Policy
- ACH Fraud
- Acronis True Image
- Adobe
- Adobe Flash
- AI
- Airport Safety
- Android
- Anti-virus
- Apple
- Apple Virus
- Application Updates
- Application Whitelisting
- Applying IT Patches
- Attachments
- Backup
- Best Practices
- Big Screen iphone
- Bitcoin
- Bitlocker
- Blacklist
- Bromium
- browser security
- Business Email Compromise
- Carbon Copy Cloner
- CCleaner
- CCPA
- Children
- Clean Browsing
- Cloud
- Computer Processor
- Computer Security Day
- Coronavirus
- covid-19
- Credit Bureaus
- Credit Card Security
- Credit Freeze
- Customer Service
- Cyber Attacks
- Cyber Fraud
- Cyber Future
- Cyber Scams
- Cyber Security
- Cyber Security Breach
- Cyber Security Training
- Data Loss Prevention
- Data Restoration
- Decoy Website
- DEF CON
- Disabling Macros
- Disaster Plans
- Disaster Recovery
- DNS
- Download
- Email Security
- Encrypted Attachments
- Equifax
- Eternal Blue
- Executive Tips
- Executives and IT
- Family Cyber Safety
- Fire Phone
- Firefox
- Firewall
- Firing IT Firms
- free wifi
- FTC
- Gmail
- Google Docs
- GoToMyPC
- Hacked Email
- Hacker Insight
- Hackers
- Hacking Competition
- Heartbleed
- High Sierra
- Home Computers
- hotspot
- hotspot safety
- Identity Theft
- Infected Apps
- Infection Vector
- Inpivx
- International Security
- Invisible Security Threats
- iOS 11
- IT Best Practices
- IT Compliance
- IT Discussions
- IT Future
- IT Network
- IT Pay
- IT Pro Tips
- IT Professionals
- IT Risk Management
- IT Security
- IT Settings
- IT Training
- IT Virus
- IT Workshops
- java
- Kasperski
- KRACK
- laptops
- LastPass
- Learn to Program
- Linux Patch
- Mac Protection
- Mac Virus
- MacBook
- Malicious Advertising
- Malware
- Microsoft Patch
- Microsoft Settings
- Mimecast
- MINIX
- mobile devices
- National Security Agency
- NIST
- NIST Recommendations
- Norton ConnectSafe
- NSA
- NYC Secure
- Online Impersonators
- Online Meetings
- Online Security
- Open DNS
- Operating Systems
- Outsourced IT Firms
- Outsourcing IT
- password
- Password Manager
- Password Safety
- Password Security
- Patch Release
- Patch Updates
- Patches
- Petya
- phones
- Preventative IT Mainenance
- Preventative IT Security Breach
- Programs
- Project Management
- Protection Tools
- Pwn2Own
- Quad9
- Ransomware
- Remote Worker
- Remote Worker Security
- Remote Workers
- Restoring
- Ring Potential Three
- RSA
- RSA Security Conference
- Save time
- Scratch
- Security Breach
- Security Logs
- Service Provider Breach
- Service Provider Safety
- Shadow Protect Desktop
- Sir Michael Fallon
- Slow Internet
- social media
- SolarWinds
- Solid State Drives
- Spam
- Spam Phishing
- SSD
- Stolen Data
- Student Cyber Security
- SuperTech 2015
- SuperTech 2016
- surface pro
- Targeted Threat Protection
- TeamViewer
- Tech Support
- Technology
- Technology Distractions
- Technology Safety
- Technology Safety Tips
- Technology Security
- Technology Tips
- Threat Protection
- Threat Protection Software
- touch screen
- Troubleshooting
- Turkish Crime Family
- two set logon
- two step login
- UK
- Uncategorized
- Uninstall
- Upgrade
- Video Meeting Security
- Videos
- VirtusTotal.com
- Virus
- VPN
- WDAG
- Web Content Filtering
- Website Security
- Whitelisting
- wi-fi best practices
- wi-fi safety
- wi-fi security
- Windows
- Windows 10
- Windows 7
- Windows Update
- Wire Transfer Fraud
- Working with IT
- Workplace Safety
- Workplace Shooter
- Yahoo
- Zoom