- Home
- Executive Tips
Latest Posts
Protect Your Network Even when Attackers Trick Your Users
A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer. The bad actor immediately took over the network and started performing highly illegal activities that appeared to come from the victim’s systems. User training is not enough. It is essential to take additional […]
Continue reading Protect Your Network Even when Attackers Trick Your UsersProtect your Company from the Imminent Threat called Eternal Blue
In 2017, the NSA made headlines after developing a hacking tool called Eternal Blue. The NSA did not notify Microsoft of the stockpiled vulnerabilities, so Microsoft didn’t know what holes to seal. The hacker group called Shadow Brokers acquired this powerful hacking tool developed by some of our nation’s best and brightest.
Continue reading Protect your Company from the Imminent Threat called Eternal BlueAttackers are Targeting High Net Worth Individuals
An experienced high-level executive shared his concern about how attackers are investing more time targeting high net worth individuals.
Continue reading Attackers are Targeting High Net Worth IndividualsHappy Computer Security Day!
November 30th is Computer Security Day. Today is a great day to remind your team members to continue to be extra vigilant as they watch for spam email messages.
Continue reading Happy Computer Security Day!Updated: Forward these 7 Minimum Security Requirements for Your Small Service Providers
Many organizations outsource to service providers that are not cyber-secure. It is common for companies to experience a significant security breach that originated at a third party. Just ask Target. Forward this request to your small outsourced providers asking them to do these seven things.
Continue reading Updated: Forward these 7 Minimum Security Requirements for Your Small Service ProvidersThe Three Biggest Cyber Security Trends Right Now
First, the attacker population is outpacing the ability to control them. Attacks are trending higher at an ever-increasing rate. Be extra security-diligent.
Continue reading The Three Biggest Cyber Security Trends Right NowDo the Basics. Do not Believe that Threat Protection Software Will Save You.
This week, someone told me about a group of CEOs who came to the conclusion that their IT security was handled since they installed an artificial intelligence (AI) based threat protection tool. They didn’t know it, but they were wrong.
Continue reading Do the Basics. Do not Believe that Threat Protection Software Will Save You.Your Software, such as CCleaner, May Have Backdoors
Can you trust programs you download? Millions of users, including outsourced computer firms, use a program called CCleaner on their own and on customers’ computers. CCleaner just announced that some of its software was compromised and has been stealing data from users’ computers.
Continue reading Your Software, such as CCleaner, May Have BackdoorsStraw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve It
Just yesterday, someone told me they think they are secure because they have anti-virus, strong passwords and a firewall. Last weekend, I asked my daughter to tell me a fairy tale. She chose The Three Little Pigs and the Big Bad Wolf. As she told the story, it became so clear that organizations use straw, […]
Continue reading Straw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve ItAttackers Are Using Mobile Devices as a Bridge into Your Network
A newly discovered virus, called Milky Door, permits attackers to connect to your organization’s network through apps on mobile devices. The users have no idea their mobile device is being used in this way.
Continue reading Attackers Are Using Mobile Devices as a Bridge into Your NetworkRecent Blog Posts
Blog Topics
- Account Lockout Policy
- ACH Fraud
- Acronis True Image
- Adobe
- Adobe Flash
- AI
- Airport Safety
- Android
- Anti-virus
- Apple
- Apple Virus
- Application Updates
- Application Whitelisting
- Applying IT Patches
- Attachments
- Backup
- Best Practices
- Big Screen iphone
- Bitcoin
- Bitlocker
- Blacklist
- Bromium
- browser security
- Carbon Copy Cloner
- CCleaner
- Children
- Clean Browsing
- Cloud
- Computer Processor
- Computer Security Day
- Credit Bureaus
- Credit Card Security
- Credit Freeze
- Customer Service
- Cyber Attacks
- Cyber Fraud
- Cyber Future
- Cyber Scams
- Cyber Security
- Cyber Security Breach
- Cyber Security Training
- Data Loss Prevention
- Data Restoration
- DEF COM
- Disabling Macros
- Disaster Recovery
- DNS
- Download
- Email Security
- Encrypted Attachments
- Equifax
- Eternal Blue
- Executive Tips
- Executives and IT
- Family Cyber Safety
- Fire Phone
- Firefox
- Firewall
- Firing IT Firms
- free wifi
- FTC
- Gmail
- Google Docs
- GoToMyPC
- Hacked Email
- Hacker Insight
- Hackers
- Hacking Competition
- Heartbleed
- High Sierra
- Home Computers
- hotspot
- hotspot safety
- Identity Theft
- Infected Apps
- Inpivx
- International Security
- Invisible Security Threats
- iOS 11
- IT Best Practices
- IT Compliance
- IT Discussions
- IT Future
- IT Network
- IT Pay
- IT Pro Tips
- IT Professionals
- IT Security
- IT Settings
- IT Training
- IT Virus
- IT Workshops
- java
- Kasperski
- KRACK
- laptops
- LastPass
- Learn to Program
- Linux Patch
- Mac Protection
- Mac Virus
- MacBook
- Malware
- Microsoft Patch
- Microsoft Settings
- Mimecast
- MINIX
- mobile devices
- National Security Agency
- NIST
- NIST Recommendations
- Norton ConnectSafe
- NSA
- NYC Secure
- Online Impersonators
- Online Security
- Open DNS
- Operating Systems
- Outsourced IT Firms
- Outsourcing IT
- password
- Password Manager
- Password Safety
- Password Security
- Patch Release
- Patch Updates
- Patches
- Petya
- phones
- Preventative IT Mainenance
- Preventative IT Security Breach
- Programs
- Project Management
- Protection Tools
- Pwn2Own
- Quad9
- Ransomware
- Remote Workers
- Restoring
- Ring Potential Three
- RSA
- RSA Security Conference
- Save time
- Scratch
- Security Breach
- Security Logs
- Service Provider Breach
- Service Provider Safety
- Shadow Protect Desktop
- Sir Michael Fallon
- social media
- Solid State Drives
- Spam
- Spam Phishing
- SSD
- Stolen Data
- Student Cyber Security
- SuperTech 2015
- SuperTech 2016
- surface pro
- Targeted Threat Protection
- TeamViewer
- Tech Support
- Technology
- Technology Distractions
- Technology Safety
- Technology Safety Tips
- Technology Security
- Technology Tips
- Threat Protection Software
- touch screen
- Troubleshooting
- Turkish Crime Family
- two set logon
- two step login
- UK
- Uncategorized
- Uninstall
- Upgrade
- Videos
- VirtusTotal.com
- Virus
- WDAG
- Web Content Filtering
- Website Security
- Whitelisting
- wi-fi best practices
- wi-fi safety
- wi-fi security
- Windows
- Windows 10
- Windows 7
- Wire Transfer Fraud
- Working with IT
- Workplace Safety
- Workplace Shooter
- Yahoo