by Mike Foster | Dec 15, 2016 | Alerts, Cyber Security, Cyber Security Breach, Cybersecurity, Family Cyber Safety, IT Best Practices, Online Security, Password Safety, Security Breach, Technology Safety Tips, Yahoo
You hear in the news that Yahoo, or some other company, got hacked and your username and password may be in the hands of attackers. There is a way to find out if your credentials were exposed. An Australian Web Security Specialist, Troy Hunt, has compiled a database...
by Mike Foster | Dec 12, 2016 | Alerts, browser security, Cyber Scams, Cyber Security, Cybersecurity, Data Loss Prevention, IT Best Practices, Spam Phishing, Technology Safety, Technology Safety Tips, Technology Security, Wire Transfer Fraud
It happens all the time: A user clicks on a link in an email message, and the computer gets infected. Ransomware can lock up the data on the drive or even your servers. Sensitive data can be stolen, wire transfers attempted, and other bad things can happen. When a...
by Mike Foster | Dec 1, 2016 | Android, Application Updates, Cyber Security Breach, Cybersecurity, Google, Infected Apps, Mobile Devices, Patch Release, phones, Technology Tips
It was reported yesterday that malicious apps running on Android phones has resulted in 1 million Google user accounts being hacked. Check Point Software Technologies estimates that 75% of Android phones are still vulnerable to this attack. Once the attackers take...
by Mike Foster | Nov 28, 2016 | Executives and IT, IT Best Practices, IT Pro Tips, IT Professionals
To keep their job, IT Professionals must do three things. First, IT Professionals need to know that the boss is always right. If the executives say that they do not want to use passwords, then that settles it. Of course, IT Pros should make recommendations, but let...