- Home
- IT Settings
Latest Posts
A Way to Control Consultant Access – Every Time
What if you’d like to know each and every time a consultant attempted to access your systems? And would you like the ability to approve or deny each attempt?
Continue reading A Way to Control Consultant Access – Every TimeMicrosoft Using Your Computer To Deliver Software
Microsoft built a feature into Windows 10 called Delivery Optimization. Your computer may deliver and receive apps and patches to and from computers belonging to complete strangers. Your computer becomes a server to deliver patches and apps to people on the Internet. Though it is likely enabled on your computers, you can turn this feature […]
Continue reading Microsoft Using Your Computer To Deliver SoftwareLenovo Computers Infected
Urgent bulletin: Lenovo pre-installed software called SuperFish on computers that is a security risk. This is just another example of why it is so important to remove the junk-ware from new computers. Follow these instructions from Lenovo: http://support.lenovo.com/us/en/product_security/superfish_uninstall Please forward this to anyone you know who might have purchased a Lenovo computer – laptops included.
Continue reading Lenovo Computers InfectedA Possible Solution for Ransomware
Ransomware is hitting so many companies hard. If you’ve not heard of it, you will soon. Ransomware is an infection that encrypts files on your network such that you cannot access the files. This can be devastating. The best way to deal with ransomware is…
Continue reading A Possible Solution for RansomwareGet Attacked in a Flash
Adobe Flash is one of the programs that attackers love to exploit. Be sure you have the newest version – Adobe just released important patches…
Continue reading Get Attacked in a FlashKnow About this IT Networking Strategy Change
Executives – There is a new strategy to consider moving toward that can save you money, increase security, speed up your networks and help you get ahead of your competition. What should you do about your Cisco stocks? Even the WSJ is talking about…
Continue reading Know About this IT Networking Strategy ChangeUse Windows 7 with Windows 8’s Benefits
As businesses transition to Windows 8, they don’t want to train their user in Windows 8. Here is a short 90 second video that shows the secret about how you can give Windows 7 all the great new stability, security, and speed that Windows 8 has to offer.
Continue reading Use Windows 7 with Windows 8’s BenefitsAdding Security Makes Systems Unusable!
Ask your IT Professional: “Are you implementing the protections that users won’t notice anyway?” …
Continue reading Adding Security Makes Systems Unusable!Linksys products – if you use them at home or work – you may be vulnerable to an attack
Your IT professionals are very busy and often don’t have time to keep up with what are called “firmware updates.” It turns out that many manufacturer’s products, including Linksys products that are common in smaller businesses and in homes, are getting hacked. Ask your IT professional to update your firmware. They may need to disable […]
Continue reading Linksys products – if you use them at home or work – you may be vulnerable to an attackIT May Have Your Users Misconfigured!
This is the start of a new series called “What to ask your IT professionals.” This series will provide you, the busy executive, with quick and important questions to discuss with IT. This series empowers you, as an executive, to broach topics that don’t “come up” in ordinary conversation.
Continue reading IT May Have Your Users Misconfigured!Recent Blog Posts
- Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems
- Essential Equipment for Work From Home Users During Power Outages
- Prepare Now to Recover Quickly from Ransomware on Mac and Windows Computers
- A Simple Way to Protect Work From Home Users and Families
- Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks
Blog Topics
- Account Lockout Policy
- ACH Fraud
- Acronis True Image
- Adobe
- Adobe Flash
- AI
- Airport Safety
- Android
- Anti-virus
- Apple
- Apple Virus
- Application Updates
- Application Whitelisting
- Applying IT Patches
- Attachments
- Backup
- Best Practices
- Big Screen iphone
- Bitcoin
- Bitlocker
- Blacklist
- Bromium
- browser security
- Business Email Compromise
- Carbon Copy Cloner
- CCleaner
- CCPA
- Children
- Clean Browsing
- Cloud
- Computer Processor
- Computer Security Day
- Coronavirus
- covid-19
- Credit Bureaus
- Credit Card Security
- Credit Freeze
- Customer Service
- Cyber Attacks
- Cyber Fraud
- Cyber Future
- Cyber Scams
- Cyber Security
- Cyber Security Breach
- Cyber Security Training
- Data Loss Prevention
- Data Restoration
- Decoy Website
- DEF CON
- Disabling Macros
- Disaster Plans
- Disaster Recovery
- DNS
- Download
- Email Security
- Encrypted Attachments
- Equifax
- Eternal Blue
- Executive Tips
- Executives and IT
- Family Cyber Safety
- Fire Phone
- Firefox
- Firewall
- Firing IT Firms
- free wifi
- FTC
- Gmail
- Google Docs
- GoToMyPC
- Hacked Email
- Hacker Insight
- Hackers
- Hacking Competition
- Heartbleed
- High Sierra
- Home Computers
- hotspot
- hotspot safety
- Identity Theft
- Infected Apps
- Infection Vector
- Inpivx
- International Security
- Invisible Security Threats
- iOS 11
- IT Best Practices
- IT Compliance
- IT Discussions
- IT Future
- IT Network
- IT Pay
- IT Pro Tips
- IT Professionals
- IT Risk Management
- IT Security
- IT Settings
- IT Training
- IT Virus
- IT Workshops
- java
- Kasperski
- KRACK
- laptops
- LastPass
- Learn to Program
- Linux Patch
- Mac Protection
- Mac Virus
- MacBook
- Malicious Advertising
- Malware
- Microsoft Patch
- Microsoft Settings
- Mimecast
- MINIX
- mobile devices
- National Security Agency
- NIST
- NIST Recommendations
- Norton ConnectSafe
- NSA
- NYC Secure
- Online Impersonators
- Online Meetings
- Online Security
- Open DNS
- Operating Systems
- Outsourced IT Firms
- Outsourcing IT
- password
- Password Manager
- Password Safety
- Password Security
- Patch Release
- Patch Updates
- Patches
- Petya
- phones
- Preventative IT Mainenance
- Preventative IT Security Breach
- Programs
- Project Management
- Protection Tools
- Pwn2Own
- Quad9
- Ransomware
- Remote Worker
- Remote Worker Security
- Remote Workers
- Restoring
- Ring Potential Three
- RSA
- RSA Security Conference
- Save time
- Scratch
- Security Breach
- Security Logs
- Service Provider Breach
- Service Provider Safety
- Shadow Protect Desktop
- Sir Michael Fallon
- Slow Internet
- social media
- SolarWinds
- Solid State Drives
- Spam
- Spam Phishing
- SSD
- Stolen Data
- Student Cyber Security
- SuperTech 2015
- SuperTech 2016
- surface pro
- Targeted Threat Protection
- TeamViewer
- Tech Support
- Technology
- Technology Distractions
- Technology Safety
- Technology Safety Tips
- Technology Security
- Technology Tips
- Threat Protection
- Threat Protection Software
- touch screen
- Troubleshooting
- Turkish Crime Family
- two set logon
- two step login
- UK
- Uncategorized
- Uninstall
- Upgrade
- Video Meeting Security
- Videos
- VirtusTotal.com
- Virus
- VPN
- WDAG
- Web Content Filtering
- Website Security
- Whitelisting
- wi-fi best practices
- wi-fi safety
- wi-fi security
- Windows
- Windows 10
- Windows 7
- Windows Update
- Wire Transfer Fraud
- Working with IT
- Workplace Safety
- Workplace Shooter
- Yahoo
- Zoom