by Mike Foster | Aug 20, 2021 | Cybersecurity, Cybersecurity Audits, Wireless Security
Businesses sometimes have air conditioning systems, light controllers, music, VoIP phones, and similar devices connected to their network. If an attacker successfully breaks into any of those devices, the attacker can use them as a platform to launch attacks against...
by Mike Foster | Aug 13, 2021 | Cybersecurity, Cybersecurity Audits, Supporting IT Professionals, Uncategorized
Tell your IT provider, or internal IT team, that you want them to isolate or filter the VPN connections. At least discuss this security step with them. If any users connect via VPN to your office, be sure your IT team isolates or filters the data that travels from the...
by Mike Foster | Jul 30, 2021 | Cybersecurity, Hacking, Ransomware
If you get ransomware that encrypts your files and restoring your backups doesn’t work, try this: Go to www.nomoreransom.org/crypto-sheriff.php and upload two of your encrypted files. The site will analyze the files to determine if it has a tool that can decrypt...
by Mike Foster | Jul 23, 2021 | Cybersecurity, Hacking
Microsoft confirmed that attackers are exploiting systems now using a PrintNightmare Attack. As of this moment, there is no security patch. IT Pros are so busy managing other projects and initiatives that they could be unaware of this new exploit. Forward this message...