Essential Equipment for Work From Home Users During Power Outages
Assuming your remote workers’ do not get too cold, they can continue to work at home during short power outages. You can encourage them to buy, or even issue them, a small uninterruptable power supply UPS for their Internet router. Laptops have built-in battery power. If a worker has a desktop computer or other networking […]Continue Reading
Prepare Now to Recover Quickly from Ransomware on Mac and Windows Computers
Equip all of your Work from Home users with a cloned drive so they can help protect your network and get up and running quickly if they get ransomware or if their hard drive crashes. Protect your home family computers the same way.Continue Reading
A Simple Way to Protect Work From Home Users and Families
Some services, free for home use, can protect your family devices from accessing malicious web servers even if you accidentally click a fraudulent link. If you already use Eero or some other family safety service, it probably already filters out bad sites for you, and you needn’t use these services. But if you have no […]Continue Reading
Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks
Will running one rarely used program stop future attacks? It will in the SolarWinds attack and perhaps stop future compromises too.Continue Reading
Three of the Most Useful Links About the SolarWinds Attack:
Even if you don’t use SolarWinds, your suppliers and customers might. In some cases, your security is only as good as their security. There are so many webpages about the Solar Winds attack. Here are three of the most useful. Please forward this to your IT team.Continue Reading
The SolarWinds Breach Affects You Too. Ask your IT Team to Take these Steps.
The investigation into the SolarWinds breach keeps revealing more shocking ways attackers infiltrated organizations. Even if your organization doesn’t use SolarWinds, you must take action.Continue Reading
Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks
Bad Actors compromised a product called SolarWinds Orion and then used that as a vector attack organization. Ask your IT team if they use SolarWinds products, and if so, they mustContinue Reading
Your 2021 Budget Should Accurately Differentiate IT Expenses from Cyber Risk Management.
Recently, the CEO of an organization told me that his budgeting process demonstrates his commitment to protecting from cyber-attacks because he includes his investments in the IT Vital Systems Reviews as part of his risk management budget. You might already do this too.Continue Reading