by Mike Foster | Mar 28, 2017 | Alerts, Best Practices, Cyber Scams, Cyber Security, Cybersecurity, IT Best Practices, LastPass, password, Password Safety, Password Security, Patch Updates, Technology Safety Tips
A password manager company announced that there is a vulnerability that could allow attackers to gather stored passwords. Password managers are very helpful since they make it so convenient to be secure, and can greatly simplify and speed up the login process at...
by Mike Foster | Mar 24, 2017 | Apple, Best Practices, Cyber Security, Cyber Security Breach, IT Best Practices, Mac Protection, Password Safety, Password Security, Preventative IT Security Breach, Security Breach, Turkish Crime Family
If you use Apple products, here is what to do to protect yourself. By now, you’ve probably heard that attackers have told Apple that they have access to millions of iPhone and iCloud accounts. The hacking group calls themselves “Turkish Crime Family.” They are...
by Mike Foster | Mar 16, 2017 | Alerts, Best Practices, Cyber Scams, Cybersecurity, Malware, Mimecast, Ransomware, Targeted Threat Protection, Technology Safety Tips, Wire Transfer Fraud
Everyone is concerned about the danger of a user clicking on a link in an email message, perhaps invoking a ransomware attack, or users responding to requests to transfer money. There are tools that will help.FYI: We do not receive any kind of compensation or payment...
by Mike Foster | Feb 23, 2017 | Bromium, Cyber Scams, Cyber Security, Cyber Security Breach, Cybersecurity, Download, IT Best Practices, IT Virus, Ransomware, RSA, WDAG
Imagine giving each of your team members a loaner computer every time they need to open a file that they download or receive as an attachment. The loaner computers won’t be connected to your network, so if a file is infected, ransomware and other viruses would not...