Client Name: (business name removed)
Service Details: Business client, on-site consult, on-site support
Problem and Request: Client reported that they were seeing “ransom” messages appear on their computers, and that they couldn’t access files because they had been locked by a virus. They needed help restoring access to their files and securing their IT environment.
Continue reading “CASE STUDY: Encrypting Ransomware Hits Small Business”
Antivirus Software Isn’t 100% Effective
You probably already know that installing an antivirus software program and keeping it up to date is a critical step in protecting your computer. This essential software uses virus signatures provided by software vendors to look for malware and stop it before it infects your PC (or Mac).
What you may not be aware of is that antivirus software does not offer total protection against malware infection. In fact, today’s malware authors will often use widely-available crypting services to ensure that their malware is completely undetectable by the majority of the antivirus software on the market.
Continue reading “How to Spot a Phishing Email: Tips and Examples”
Cyber security, also referred to as information technology security, is the act of protecting data and information systems from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction.
Implementing good security practices doesn’t have to be difficult or expensive, however. This blog post focuses on a few easy ways that you can improve your cyber security.
Continue reading “4 Tips to Improve Your Cyber Security”
By now, chances are you’ve probably heard about the massive cyber attack against a major U.S. internet company that occurred on Friday, October 21, 2016.
The DDoS attack brought down large parts of the web and was one of the biggest on record. Now many people are now asking: who was responsible?
Continue reading “DDoS Attacks: Securing Your Connected Home and IoT Devices”
Encrypting Ransomware — a type of malicious software (malware) that encrypts the victim’s files and holds them hostage until the victim pays a ransom in Bitcoin — has emerged as a potent and increasingly common threat online.
Continue reading “Encrypting Ransomware Warning”
Client Name: Veronika K.
Service Details: Business client, on-site consult, on-site support, remote support, remote consult
Problem and Request: Client is an executive assistant that needed help with keeping her boss’s personal and business affairs organized, secured, and easy to use. The status quo of using a mix of personal Gmail and iCloud accounts was difficult to work with, fragmented, and insecure.
Continue reading “Google Apps for Executive Assistant and Boss”
If you’re the kind of person who constantly resets passwords and usernames, recycles the same password you’ve been using for the past seven years, and struggles with tracking password changes on hand-written notes or spreadsheets, then it’s time for a serious upgrade. You need a password management tool. Continue reading “Protecting Your Accounts With a Secure Password Manager”
ABOVE: A photo of a screen showing what is apparently the skull splash page that appeared on Sony company computers when the attack started, posted by someone who said he was a former Sony employee who was sent the image by current Sony employees. The image was first posted on Reddit.
Continue reading “Don’t Be A Target (or a Sony): Information Security Review”
The Identity Theft Resource Center, which tracks data breaches, has counted 381 reported breaches and 10.8 million records exposed from the start of the year through June. Below is a slide show with some of the worst of these for the first quarter: Continue reading “Worst Data Breaches of 2014…So Far”
Security researchers have discovered a serious vulnerability in OpenSSL, the cryptographic software library that protects many web sites on the internet. Here’s what that means for you, the average user.
Continue reading “The Heartbleed Bug: What the Average User Can Do”