by Mike Foster | Jul 14, 2017 | Best Practices, Cyber Security, Cybersecurity, Data Loss Prevention, Disaster Recovery, Home Computers, IT Best Practices, Ransomware, Remote Workers
Ransomware is a common problem. If an attacker encrypts all your files and demands that you pay ransom to unlock your files, you will want to be able to recover quickly. Regular backups are not enough. Regular backups, including file backups, can do a great job of...
by Mike Foster | Jul 3, 2017 | Alerts, Cybersecurity, International Security, Sir Michael Fallon, UK
The UK is preparing to attack hackers with Army, Navy and Air Force. Sir Michael Fallon, the UK’s defense secretary, warned attackers that the UK will hunt them down, and respond not just in cyber-space, but also using air, land, and sea forces. Imagine soldiers,...
by Mike Foster | Jun 28, 2017 | Alerts, Cyber Security, Cyber Security Breach, Cybersecurity, IT Best Practices, Petya, Ransomware, Technology Security
A new strain of Ransomware, dubbed P e t y a, is gaining momentum infecting companies and home users. Worst of all, in addition to holding files ransom until you pay up, it appears to be infiltrating corporate networks to steal usernames and passwords too. Be sure...
by Mike Foster | Jun 21, 2017 | Best Practices, Cybersecurity, LastPass, password, Password Manager, Password Safety, Password Security
Without getting complicated, OneLogin, Okta, Centrify, Microsoft, RSA SecureID Access, SalesForce App Cloud, and even more basic password managers store user identities, and login information. Using these services means that users only need to remember one password...