by Mike Foster | May 6, 2021 | Application Updates, Applying IT Patches, Best Practices, Cyber Attacks, Cyber Security, Cybersecurity, IT Best Practices
Your IT Team has an opportunity to patch a security weakness in your Dell computers. If you facilitate them acting now, you will probably be one step ahead of attackers. The good news is Dell’s not detected any attacks in the wild. However, now bad actors have a...
by Mike Foster | Apr 28, 2021 | Cyber Security
Whether you use an Android or Apple phone, Apple created a short 2-minute video that explains a new privacy feature. The knowledge in the video explains privacy concerns that Android users need to know about too: Apple’s new App Tracking Transparency feature...
by Mike Foster | Apr 9, 2021 | Cyber Security
Hackers competing in this year’s PWN2OWN competition earned hundreds of thousands of dollars. Who paid them? The companies they hacked. But it isn’t ransomware; this is an example of bug bounty activities. Companies, including Microsoft, Zoom, and Apple...
by Mike Foster | Mar 18, 2021 | Cyber Security, Technology Safety Tips
A wonderful person who is tech-savvy sent an e-mail message yesterday explaining that she cannot trust her mom with a computer or phone anymore because scammers posing as Microsoft stole $2000 from her. Take a few moments to have the anti-scammer conversation with...