How to Delete Online Accounts to Protect Your Identity

Having too many digital accounts raises your risk of data being misused or stolen. Here’s how to clean house. Deleting online accounts is one of the best ways to protect data security and privacy. The less data you have stored on websites across the internet, the safer you are from being hacked or personal info … Read moreHow to Delete Online Accounts to Protect Your Identity

Are iPhones Truly As Private As Apple Says?

It is no secret that cyber criminals are becoming a more prominent threat to businesses.  However, what many business owners fail to understand is that cybercriminals are looking to find weak links within the target’s employees, rather than their firewalls.  Human error accounts for the majority of the breaches that occur so it would be … Read moreAre iPhones Truly As Private As Apple Says?

Top 10 techniques to guarantee an unpleasant visit from the IT guy

#10:  Tweet some vicious insults about Kim Jong Un. North Korea’s hack of Sony, which destroyed about 70% of Sony’s IT infrastructure, was motivated by the publishing of a movie that was critical of North Korean leader. Recommendation:  Be very careful what you publish online, and start taking your privacy seriously.   #9:  Go ahead … Read moreTop 10 techniques to guarantee an unpleasant visit from the IT guy

Where is my phone?

Of the perks of being a bit nerdy is that I get to read lots of good technology articles.  When I come across a really good one, I try to make sure I share it with my customers.  I really enjoy reading WIRED (, and came across an article recently that definitely qualifies.  If you … Read moreWhere is my phone?

Spread the Microsoft Word

You have probably never heard of the organization called FIN7.  Although estimates vary, FIN7, a very organized and successful Ukrainian based hacking group, has probably earned well over a billion dollars (with a B) from businesses all over the world.  It appears that stolen credit cards were their primary revenue generator, but the full scope … Read moreSpread the Microsoft Word

OneDrive Off A Cliff

In my last blog, I posted about the value of implementing two-factor authentication (2FA) as a significant enhancement to the security of the traditional username/password authentication method.  The availability of free authentication applications like Google Authenticator, Authy, and FreeOTP (there are many more), and the ever growing list of public websites that now support these … Read moreOneDrive Off A Cliff

Security Training Awareness: Create A Plan and Track Effectiveness

email security on laptop

As robust as your organization’s security program, policies, and toolsets are, there is still one vulnerability that even the most secure IT department cannot control – your employees. Cybercriminals rely on the fact that many employees are inadequately trained and underestimate the risks of phishing scams and ransomware.  With over 53,000 security incidents and more … Read moreSecurity Training Awareness: Create A Plan and Track Effectiveness

What happens when trusted software is the virus?

hack on keyboard

Hackers have ingeniously struck again by adding a hidden backdoor into a popular maintenance and file clean-up tool, CCleaner for Windows. The hacked version of the tool allows for the malicious download of additional malware, meaning the hackers could do anything with those affected systems. According to Avast, the company that owns CCleaner, approximately 2.27 million systems ran … Read moreWhat happens when trusted software is the virus?

Welcome to the New Normal

ransomware skull and files

Welcome to the new normal, as we usher in another massive worldwide fear inspiring ransomware attack.  I will spare you the technical details of this specific malware, but I do feel it is important to understand the common elements of this latest attack, and the ongoing preferred methodology being used in ransomware attacks. In April of this … Read moreWelcome to the New Normal

We use cookies to gather information about the way you interact with our website, to create reports, and overall help us in improving the website. To learn more about our cookie policy, view our Privacy Policy. By clicking “Accept & Close”, you consent to the use of cookies unless you have disabled them.