Your security logs for your firewall, for Azure, Office 365, and more, might show attacks from countries worldwide. Increase your security by blocking data from countries where you do not do business. If an attack originates from those countries, technology can help...
Because of so many work from home users, the Internet is like a box of chocolates for attackers. Step 1: Attackers compromise work-from-home users. Step 2: They gain access to their company. Step 3: They bite into the company to discover what’s inside. There are...
Last weekend, our family drove to southwestern Montana looking for Coolidge, a thriving mining town turned Ghost Town. After we entered a remote valley, cell service went away. I handed our road atlas to my 18-year-old son, appointed him navigator, and asked for our...
One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don’t want to power it down, at least disconnect from your network. You’ll make your computer less attractive to attackers, and it limits the...