- Home
- Cyber Security Tips
Latest Posts
Beware: Attackers Buy Top Search Engine Results to Trick You
What seems to be the best way to find a company’s website? Use a search engine, of course. The danger is that scammers can pay for top spots on search engine results to trick you into accessing a malicious site.
Continue reading Beware: Attackers Buy Top Search Engine Results to Trick YouOne Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself
Workers who use their personal home computers for business put you at significant risk.
Continue reading One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect YourselfA Hacker Profile – Who Are They?
I experienced a presentation by the US Secret Service last week, and they provided the common background they’ve identified in attackers:
Continue reading A Hacker Profile – Who Are They?Your Work From Home Users are Like a Box of Chocolates
Because of so many work from home users, the Internet is like a box of chocolates for attackers.
Continue reading Your Work From Home Users are Like a Box of ChocolatesPower Down to Boost Security
One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don’t want to power it down, at least disconnect from your network.
Continue reading Power Down to Boost SecurityTwo Tips to Make Your Online Meetings Better
Everyone is concerned about video conferencing security, and they should be. But when the hardware and software are not working right, safety seems like a distraction.
Continue reading Two Tips to Make Your Online Meetings BetterZoom Security Settings – The Concise Details
Zoom has many security settings. This is a detailed but concise guide to the settings and how they work.
Continue reading Zoom Security Settings – The Concise DetailsZoom Security – Follow Along to Set Security Settings
Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings. This video is […]
Continue reading Zoom Security – Follow Along to Set Security SettingsPlan Now for Slow Internet and Dropped Phone Calls
Prepare now for slow Internet speeds and dropped mobile phone calls. Some customers report that their remote workers experience slow Internet speeds. The sheer number of people working from home, and others watching videos at home, is causing the Internet to experience slowdowns similar to traffic during rush hour.
Continue reading Plan Now for Slow Internet and Dropped Phone CallsWarn Your Workers about Attacker Decoy Tactics
Alert your workers to be on guard looking for fake, decoy websites about coronavirus,
Continue reading Warn Your Workers about Attacker Decoy TacticsRecent Blog Posts
- Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems
- Essential Equipment for Work From Home Users During Power Outages
- Prepare Now to Recover Quickly from Ransomware on Mac and Windows Computers
- A Simple Way to Protect Work From Home Users and Families
- Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks
Blog Topics
- Account Lockout Policy
- ACH Fraud
- Acronis True Image
- Adobe
- Adobe Flash
- AI
- Airport Safety
- Android
- Anti-virus
- Apple
- Apple Virus
- Application Updates
- Application Whitelisting
- Applying IT Patches
- Attachments
- Backup
- Best Practices
- Big Screen iphone
- Bitcoin
- Bitlocker
- Blacklist
- Bromium
- browser security
- Business Email Compromise
- Carbon Copy Cloner
- CCleaner
- CCPA
- Children
- Clean Browsing
- Cloud
- Computer Processor
- Computer Security Day
- Coronavirus
- covid-19
- Credit Bureaus
- Credit Card Security
- Credit Freeze
- Customer Service
- Cyber Attacks
- Cyber Fraud
- Cyber Future
- Cyber Scams
- Cyber Security
- Cyber Security Breach
- Cyber Security Training
- Data Loss Prevention
- Data Restoration
- Decoy Website
- DEF CON
- Disabling Macros
- Disaster Plans
- Disaster Recovery
- DNS
- Download
- Email Security
- Encrypted Attachments
- Equifax
- Eternal Blue
- Executive Tips
- Executives and IT
- Family Cyber Safety
- Fire Phone
- Firefox
- Firewall
- Firing IT Firms
- free wifi
- FTC
- Gmail
- Google Docs
- GoToMyPC
- Hacked Email
- Hacker Insight
- Hackers
- Hacking Competition
- Heartbleed
- High Sierra
- Home Computers
- hotspot
- hotspot safety
- Identity Theft
- Infected Apps
- Infection Vector
- Inpivx
- International Security
- Invisible Security Threats
- iOS 11
- IT Best Practices
- IT Compliance
- IT Discussions
- IT Future
- IT Network
- IT Pay
- IT Pro Tips
- IT Professionals
- IT Risk Management
- IT Security
- IT Settings
- IT Training
- IT Virus
- IT Workshops
- java
- Kasperski
- KRACK
- laptops
- LastPass
- Learn to Program
- Linux Patch
- Mac Protection
- Mac Virus
- MacBook
- Malicious Advertising
- Malware
- Microsoft Patch
- Microsoft Settings
- Mimecast
- MINIX
- mobile devices
- National Security Agency
- NIST
- NIST Recommendations
- Norton ConnectSafe
- NSA
- NYC Secure
- Online Impersonators
- Online Meetings
- Online Security
- Open DNS
- Operating Systems
- Outsourced IT Firms
- Outsourcing IT
- password
- Password Manager
- Password Safety
- Password Security
- Patch Release
- Patch Updates
- Patches
- Petya
- phones
- Preventative IT Mainenance
- Preventative IT Security Breach
- Programs
- Project Management
- Protection Tools
- Pwn2Own
- Quad9
- Ransomware
- Remote Worker
- Remote Worker Security
- Remote Workers
- Restoring
- Ring Potential Three
- RSA
- RSA Security Conference
- Save time
- Scratch
- Security Breach
- Security Logs
- Service Provider Breach
- Service Provider Safety
- Shadow Protect Desktop
- Sir Michael Fallon
- Slow Internet
- social media
- SolarWinds
- Solid State Drives
- Spam
- Spam Phishing
- SSD
- Stolen Data
- Student Cyber Security
- SuperTech 2015
- SuperTech 2016
- surface pro
- Targeted Threat Protection
- TeamViewer
- Tech Support
- Technology
- Technology Distractions
- Technology Safety
- Technology Safety Tips
- Technology Security
- Technology Tips
- Threat Protection
- Threat Protection Software
- touch screen
- Troubleshooting
- Turkish Crime Family
- two set logon
- two step login
- UK
- Uncategorized
- Uninstall
- Upgrade
- Video Meeting Security
- Videos
- VirtusTotal.com
- Virus
- VPN
- WDAG
- Web Content Filtering
- Website Security
- Whitelisting
- wi-fi best practices
- wi-fi safety
- wi-fi security
- Windows
- Windows 10
- Windows 7
- Windows Update
- Wire Transfer Fraud
- Working with IT
- Workplace Safety
- Workplace Shooter
- Yahoo
- Zoom