- Home
- Apple
Latest Posts
Protecting and Restricting iPads, iPhones, and Android Devices
Because many families, and business professionals, received new tablets for the holidays, it is important to consider security. Families, as well as businesses, may choose to restrict permissions on devices. Here’s how:
Continue reading Protecting and Restricting iPads, iPhones, and Android DevicesMac Vulnerability Permits Unauthorized Login
Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do:
Continue reading Mac Vulnerability Permits Unauthorized LoginNew iPhone and iPad iOS 11 Can Quietly Override Your Attempt to Be Secure
The new Apple iOS 11 has a feature that appears to permit you to turn Wi-Fi on and off from the easy to reach Control Center. However, some people in the security community are concerned since the setting does no such thing.
Continue reading New iPhone and iPad iOS 11 Can Quietly Override Your Attempt to Be SecureGet Apple’s Urgent Patches that Fix Dozens of Security Holes
For those of you with Apple products, Apple just released some important updates. Knowing that updates might cause a problem, please back up your computer first. You are backing up all the time already, right? Time Machine is a wonderful tool and is built in. If you want to supplement Time Machine with an additional […]
Continue reading Get Apple’s Urgent Patches that Fix Dozens of Security HolesYour iPhone and iPad are in Danger
If you use Apple products, here is what to do to protect yourself. By now, you’ve probably heard that attackers have told Apple that they have access to millions
Continue reading Your iPhone and iPad are in DangerA Site to Crash Apple Safari
There is a website at crash safari dot com that will do just that: crash safari. iPhones and iPads may freeze and reboot if someone goes to that site. The good news is
Continue reading A Site to Crash Apple SafariProtect your Mac from Viruses
More executives are realizing that their Macs can catch viruses too. Independent studies by the testing firm AV-TEST show that two top picks for Mac anti-virus are: Bitdefender Antivirus for the Mac (Around $60) Symantec Norton Security (Around $50) The latter offers more features, but the tests demonstrate that they are both effective and barely […]
Continue reading Protect your Mac from VirusesiPhone and iPad Hacking Alert
You may have heard by now about XcodeGhost and how it is the biggest infection for Apple yet. Hackers inserted malicious code into a tool that programmers use to develop Apps for the App store. What should you do now?
Continue reading iPhone and iPad Hacking AlertNew Big Screen iPhone
The iPhone 6 will have options for both the normal screen size as well as a new, larger, 5.5 inch screen. It is doubtful that they will be shipping for months, and Apple hasn’t made an official announcement – but one might come as early as today.
Continue reading New Big Screen iPhoneMacs Will Take Over Business Networks
Everyone knows Macs are cool. Many executives now use Macs. Mac computers may displace Windows PCs and Laptops as company computers. Many companies still use Windows computers at work even though employees own Apple products. Why not go Apple all the way? Is that what you have been waiting for?
Continue reading Macs Will Take Over Business NetworksRecent Blog Posts
- A Simple Way to Protect Work From Home Users and Families
- Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks
- Three of the Most Useful Links About the SolarWinds Attack:
- The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.
- Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks
Blog Topics
- Account Lockout Policy
- ACH Fraud
- Acronis True Image
- Adobe
- Adobe Flash
- AI
- Airport Safety
- Android
- Anti-virus
- Apple
- Apple Virus
- Application Updates
- Application Whitelisting
- Applying IT Patches
- Attachments
- Backup
- Best Practices
- Big Screen iphone
- Bitcoin
- Bitlocker
- Blacklist
- Bromium
- browser security
- Business Email Compromise
- Carbon Copy Cloner
- CCleaner
- CCPA
- Children
- Clean Browsing
- Cloud
- Computer Processor
- Computer Security Day
- Coronavirus
- covid-19
- Credit Bureaus
- Credit Card Security
- Credit Freeze
- Customer Service
- Cyber Attacks
- Cyber Fraud
- Cyber Future
- Cyber Scams
- Cyber Security
- Cyber Security Breach
- Cyber Security Training
- Data Loss Prevention
- Data Restoration
- Decoy Website
- DEF CON
- Disabling Macros
- Disaster Plans
- Disaster Recovery
- DNS
- Download
- Email Security
- Encrypted Attachments
- Equifax
- Eternal Blue
- Executive Tips
- Executives and IT
- Family Cyber Safety
- Fire Phone
- Firefox
- Firewall
- Firing IT Firms
- free wifi
- FTC
- Gmail
- Google Docs
- GoToMyPC
- Hacked Email
- Hacker Insight
- Hackers
- Hacking Competition
- Heartbleed
- High Sierra
- Home Computers
- hotspot
- hotspot safety
- Identity Theft
- Infected Apps
- Infection Vector
- Inpivx
- International Security
- Invisible Security Threats
- iOS 11
- IT Best Practices
- IT Compliance
- IT Discussions
- IT Future
- IT Network
- IT Pay
- IT Pro Tips
- IT Professionals
- IT Risk Management
- IT Security
- IT Settings
- IT Training
- IT Virus
- IT Workshops
- java
- Kasperski
- KRACK
- laptops
- LastPass
- Learn to Program
- Linux Patch
- Mac Protection
- Mac Virus
- MacBook
- Malicious Advertising
- Malware
- Microsoft Patch
- Microsoft Settings
- Mimecast
- MINIX
- mobile devices
- National Security Agency
- NIST
- NIST Recommendations
- Norton ConnectSafe
- NSA
- NYC Secure
- Online Impersonators
- Online Meetings
- Online Security
- Open DNS
- Operating Systems
- Outsourced IT Firms
- Outsourcing IT
- password
- Password Manager
- Password Safety
- Password Security
- Patch Release
- Patch Updates
- Patches
- Petya
- phones
- Preventative IT Mainenance
- Preventative IT Security Breach
- Programs
- Project Management
- Protection Tools
- Pwn2Own
- Quad9
- Ransomware
- Remote Worker
- Remote Worker Security
- Remote Workers
- Restoring
- Ring Potential Three
- RSA
- RSA Security Conference
- Save time
- Scratch
- Security Breach
- Security Logs
- Service Provider Breach
- Service Provider Safety
- Shadow Protect Desktop
- Sir Michael Fallon
- Slow Internet
- social media
- SolarWinds
- Solid State Drives
- Spam
- Spam Phishing
- SSD
- Stolen Data
- Student Cyber Security
- SuperTech 2015
- SuperTech 2016
- surface pro
- Targeted Threat Protection
- TeamViewer
- Tech Support
- Technology
- Technology Distractions
- Technology Safety
- Technology Safety Tips
- Technology Security
- Technology Tips
- Threat Protection
- Threat Protection Software
- touch screen
- Troubleshooting
- Turkish Crime Family
- two set logon
- two step login
- UK
- Uncategorized
- Uninstall
- Upgrade
- Video Meeting Security
- Videos
- VirtusTotal.com
- Virus
- VPN
- WDAG
- Web Content Filtering
- Website Security
- Whitelisting
- wi-fi best practices
- wi-fi safety
- wi-fi security
- Windows
- Windows 10
- Windows 7
- Windows Update
- Wire Transfer Fraud
- Working with IT
- Workplace Safety
- Workplace Shooter
- Yahoo
- Zoom