Category Archives for "Security"

Dealing With Ransomware

When you’re working at a business, it’s always important to be knowledgeable of the tips and tricks hackers can use to steal your information. Whether they’re setting up a fake website that asks you to enter your social security number, or are sending you an email that appears to be from a coworker, there’s more to protecting your network than simply having the right security. You have to be aware of the ways your information can be stolen as well. With that said, ransomware is one of the most dangerous programs, and should be prevented at all costs. Continue Reading

Planning for Disaster Recovery

We don’t like to think about disasters, but preparing for them is better than ignoring them. FEMA estimates that 40% of businesses that experience a disaster never open again, and 25% last no more than a year after that. One of the big reasons for this is data loss. If a fire or hurricane destroys a business’s data records beyond recovery, the chances of putting the pieces back together are poor. However, a business with a disaster recovery plan can make it through a catastrophe with its data intact and get up and running quickly. Continue Reading

Whaling: Phishing for the Big Ones

You may have encountered the term “whaling” when IT people talk about spam email. It’s like phishing, but it directs its bait at really big prey.

Phishing is email designed to trick people by pretending to come from a legitimate source. The sender hopes the victim will open an attachment, click a link, divulge a password, or otherwise do something that will open a security hole which the attacker can exploit. Often it directs the recipient at a website that impersonates a government agency or business. Continue Reading

Ransomware – Extortion One Document At A Time

Since September 2013, when the ransomware plague was unleashed on the internet in the form of CryptoLocker and its copycats, to the time of this post, there are now well over a hundred different strains and the end is not in sight. Ransomware has proven to be a highly successful criminal business model and many aspiring cybercriminals big and small are now trying to muscle into this racket. Continue Reading

What is Ransomware, and How Do I Protect Myself From It?

You’re at work one day, minding your own business, when a huge man walks in through the front door. He’s wearing an expensive overcoat, but that does nothing to hide the prison tattoos along his knuckles, or the prominent knife scar along his face. He’s looking around, nodding approvingly at how successful your operation is. That’s when he leans on the counter, gives you a meaningful look, and says, “This is a nice business you got here. It would be a shame if something bad were to happen to it. Are you interested in buying yourself some peace of mind to be sure this is all protected?” Continue Reading

Passwords Remain the Weakest Link in the “Protection versus User-Friendly” Tech Battles

There is a vast amount of “how-to” information on the internet about creating strong, unique passwords. This information is especially important in the wake of several massive cyber-attacks where millions of passwords, and at least 93,000 websites and entities, including  Facebook, Twitter, Gmail, Target, and Adobe, were comprised.  Several post-attack articles listed the twenty most commonly used passwords and implored readers to examine the list.  If their password was among those  listed, they were advised to change it immediately. Continue Reading

Now That Passwords Are Not Enough: Authentication Standards

What do Google, PayPal, Microsoft, Samsung, Lenovo, Visa, Mastercard, Alibaba, Bank of America, American Express, and Dropbox have in common? They are all involved in finding a way to retire passwords in favor of more secure gatekeepers to their information or services. Realizing that as technologically advanced as each is, coming up with a foolproof means of identity authentication is a quest that takes a village, they have joined the Fast  Identity Online Alliance, also known as FIDO. Continue Reading