Twice recently, I’ve been contacted by executives who explain that someone was impersonating them on Facebook. They used my friends’ own pictures, sent messages, posted information, and everything was very inappropriate. Each friend asked what to do, and here is the...
You hear in the news that Yahoo, or some other company, got hacked and your username and password may be in the hands of attackers. There is a way to find out if your credentials were exposed. An Australian Web Security Specialist, Troy Hunt, has compiled a database...
Yesterday afternoon, I and some of the more than 100 other passengers on our jet were paying attention to the safety demo. Unexpectedly, the announcement included a statement that prohibited the use of a Samsung Galaxy Note 7 phone. Additionally, charging such a...
What if you’d like to know each and every time a consultant attempted to access your systems? And would you like the ability to approve or deny each attempt? At a client’s office this week, one of the IT Professionals had an interesting idea. He can configure two-step...