- Home
- IT security training
Latest Posts
Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems
A friend contacted me a few days ago and said, “Every few weeks, I’ll go to a site, and it will say that this appears to be a new device? For example, I’ve looked at my Twitter account this morning, and it put up my username and asked me for my password again. Is this […]
Continue reading Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated ProblemsAttackers Can Take Control of Your Network in Three Seconds, and How to Stop Them
An attacker can plug into any network port in your building and, within 3 seconds, take control of your entire network.
Continue reading Attackers Can Take Control of Your Network in Three Seconds, and How to Stop ThemZoom Security – Set Up Two-Step Login
Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you.
Continue reading Zoom Security – Set Up Two-Step LoginZoom Security Settings – The Concise Details
Zoom has many security settings. This is a detailed but concise guide to the settings and how they work.
Continue reading Zoom Security Settings – The Concise DetailsZoom Security – Follow Along to Set Security Settings
Update: The information in this video is applicable and useful now. As of April 27, Zoom v5.0 is making security improvements and moving settings. Once Zoom’s settings are stable, we’ll update this video. The video applies to the paid version of Zoom. Login to the Zoom website to set your security settings. This video is […]
Continue reading Zoom Security – Follow Along to Set Security SettingsMake your Zoom Secure
Tomorrow (Friday) morning, expect a completed guide that is quick for you to implement to lock down your Zoom security. Get started now on a few settings:
Continue reading Make your Zoom SecurePlan Now for Slow Internet and Dropped Phone Calls
Prepare now for slow Internet speeds and dropped mobile phone calls. Some customers report that their remote workers experience slow Internet speeds. The sheer number of people working from home, and others watching videos at home, is causing the Internet to experience slowdowns similar to traffic during rush hour.
Continue reading Plan Now for Slow Internet and Dropped Phone CallsRecommendations for Cybersecurity for Remote Workers During Coronavirus
The rapidly changing situation of potential school closures, self-quarantines, and public reaction to the coronavirus guarantees that at some point you will have employees who need to work from home.
Continue reading Recommendations for Cybersecurity for Remote Workers During CoronavirusWhat Will You Do if Your Customers’ Spam Filters Block Your Messages?
One of the ways your spam filter helps to stop unwanted messages is to block messages from mail servers with a bad reputation for spamming. What will you do if your company gets labeled as a spammer? First of all, nobody will receive your company’s messages.
Continue reading What Will You Do if Your Customers’ Spam Filters Block Your Messages?Protect Your Network Even when Attackers Trick Your Users
A business contacted our office last week because a bad actor tricked an employee to give them full access to their computer. The bad actor immediately took over the network and started performing highly illegal activities that appeared to come from the victim’s systems. User training is not enough. It is essential to take additional […]
Continue reading Protect Your Network Even when Attackers Trick Your UsersRecent Blog Posts
- Your Phone, Tablet, and Computer Started Hiding You – and How to Overcome the Associated Problems
- Essential Equipment for Work From Home Users During Power Outages
- Prepare Now to Recover Quickly from Ransomware on Mac and Windows Computers
- A Simple Way to Protect Work From Home Users and Families
- Tips and Tricks: An Unconventional way to Protect Yourself from SolarWinds and Future Hacks
Blog Topics
- Account Lockout Policy
- ACH Fraud
- Acronis True Image
- Adobe
- Adobe Flash
- AI
- Airport Safety
- Android
- Anti-virus
- Apple
- Apple Virus
- Application Updates
- Application Whitelisting
- Applying IT Patches
- Attachments
- Backup
- Best Practices
- Big Screen iphone
- Bitcoin
- Bitlocker
- Blacklist
- Bromium
- browser security
- Business Email Compromise
- Carbon Copy Cloner
- CCleaner
- CCPA
- Children
- Clean Browsing
- Cloud
- Computer Processor
- Computer Security Day
- Coronavirus
- covid-19
- Credit Bureaus
- Credit Card Security
- Credit Freeze
- Customer Service
- Cyber Attacks
- Cyber Fraud
- Cyber Future
- Cyber Scams
- Cyber Security
- Cyber Security Breach
- Cyber Security Training
- Data Loss Prevention
- Data Restoration
- Decoy Website
- DEF CON
- Disabling Macros
- Disaster Plans
- Disaster Recovery
- DNS
- Download
- Email Security
- Encrypted Attachments
- Equifax
- Eternal Blue
- Executive Tips
- Executives and IT
- Family Cyber Safety
- Fire Phone
- Firefox
- Firewall
- Firing IT Firms
- free wifi
- FTC
- Gmail
- Google Docs
- GoToMyPC
- Hacked Email
- Hacker Insight
- Hackers
- Hacking Competition
- Heartbleed
- High Sierra
- Home Computers
- hotspot
- hotspot safety
- Identity Theft
- Infected Apps
- Infection Vector
- Inpivx
- International Security
- Invisible Security Threats
- iOS 11
- IT Best Practices
- IT Compliance
- IT Discussions
- IT Future
- IT Network
- IT Pay
- IT Pro Tips
- IT Professionals
- IT Risk Management
- IT Security
- IT Settings
- IT Training
- IT Virus
- IT Workshops
- java
- Kasperski
- KRACK
- laptops
- LastPass
- Learn to Program
- Linux Patch
- Mac Protection
- Mac Virus
- MacBook
- Malicious Advertising
- Malware
- Microsoft Patch
- Microsoft Settings
- Mimecast
- MINIX
- mobile devices
- National Security Agency
- NIST
- NIST Recommendations
- Norton ConnectSafe
- NSA
- NYC Secure
- Online Impersonators
- Online Meetings
- Online Security
- Open DNS
- Operating Systems
- Outsourced IT Firms
- Outsourcing IT
- password
- Password Manager
- Password Safety
- Password Security
- Patch Release
- Patch Updates
- Patches
- Petya
- phones
- Preventative IT Mainenance
- Preventative IT Security Breach
- Programs
- Project Management
- Protection Tools
- Pwn2Own
- Quad9
- Ransomware
- Remote Worker
- Remote Worker Security
- Remote Workers
- Restoring
- Ring Potential Three
- RSA
- RSA Security Conference
- Save time
- Scratch
- Security Breach
- Security Logs
- Service Provider Breach
- Service Provider Safety
- Shadow Protect Desktop
- Sir Michael Fallon
- Slow Internet
- social media
- SolarWinds
- Solid State Drives
- Spam
- Spam Phishing
- SSD
- Stolen Data
- Student Cyber Security
- SuperTech 2015
- SuperTech 2016
- surface pro
- Targeted Threat Protection
- TeamViewer
- Tech Support
- Technology
- Technology Distractions
- Technology Safety
- Technology Safety Tips
- Technology Security
- Technology Tips
- Threat Protection
- Threat Protection Software
- touch screen
- Troubleshooting
- Turkish Crime Family
- two set logon
- two step login
- UK
- Uncategorized
- Uninstall
- Upgrade
- Video Meeting Security
- Videos
- VirtusTotal.com
- Virus
- VPN
- WDAG
- Web Content Filtering
- Website Security
- Whitelisting
- wi-fi best practices
- wi-fi safety
- wi-fi security
- Windows
- Windows 10
- Windows 7
- Windows Update
- Wire Transfer Fraud
- Working with IT
- Workplace Safety
- Workplace Shooter
- Yahoo
- Zoom