by Mike Foster | Dec 5, 2017 | Alerts, Best Practices, Cybersecurity, Data Loss Prevention, IT Best Practices, Preventative IT Security Breach, Ransomware, Technology Safety Tips
Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network. By default, all of your computers permit communication between each other, and attackers use those same...
by Mike Foster | Nov 29, 2017 | Apple, Cybersecurity, High Sierra, Mac Protection, Operating Systems, Technology Security
Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do: First, see if you are vulnerable. Click on the apple symbol on the top left of your screen, then choose About This Mac. If you have macOS...
by Mike Foster | Nov 28, 2017 | Cyber Security, Cybersecurity, MINIX, Operating Systems, Ring Potential Three
If this gives you a sinking feeling, it should. What most people don’t know is that, if your computer uses an Intel brand CPU, there is a hidden microprocessor dedicated to running a second operating system called MINIX. And MINIX is running right now. That’s right....
by Mike Foster | Nov 21, 2017 | Family Cyber Safety, phones
This is the time of the year when youngsters remind parents that all of their friends have phones, the latest model is out, and everyone is getting one! Some parents ask if there is an alternative. Yes. If you want to be able to reach them when they are off playing...