The Greatest Threat to Your Company’s Data And, How to Minimize It – Part 2
OOPS! Oops! That’s the word you never want to hear from your barber, your surgeon, or your pilot. Business owners are beginning to realize that it is not what they want to hear from any employee working at a company-owned computer – or a BYOD computer linked to the company system. Last week...
The Greatest Threat to Your Company’s Data And, How to Minimize It – Part 1
Yep! That’s one of them. Surprise! It’s not hackers and scammers who are the biggest threat to your company’s data security. It’s your employees. And it’s not just because they haven’t learned to keep their coffee away from their keyboard. That’s so late last century. Speaking of last century,...
Scary Thoughts About Internet Security
BOO! Welcome to cyberspace. What? Doesn't cyberspace scare you? Well, it should. Don’t blame us. We don’t want you to be scared. We want your digital technology to be protected. We’ve discovered that many people who fear cyber technology the most simply try to avoid it. On the other hand, we hav...
Backing Up: Your Computer Needs a Rearview Mirror
You wouldn’t drive your car without a rearview mirror. You certainly wouldn’t back up without one. Neither should you drive your computer without one. You might even say that backing up your computer is your rearview mirror. Perhaps if we thought of it that way we might be more consistent backing...
Good News and Bad News About Cybercrime
You’ve heard it before. We’ve got good news and we’ve got bad news. Which do you want to hear first? The crowd response to our question seems to be about 50/50, so we’ll give you the bad news first. Cybercrime is growing. You probably either knew that or expected that, so the bad news may n...
Move Over Ransomware – Here Comes Crypto-Jacking
Just when you feel like you’ve heard about all the cyber threats and attacks that can compromise your digital technology, you learn that hackers have discovered new methods of intrusion and infection. It doesn’t just feel that way. That’s the way it is. Don’t let our blog title mislead you, th...
What Willie Sutton Can Teach Us About Computer Security
Willie Sutton was arguably one of the most “successful” if not the most infamous bank robbers of the 20th century. Sutton managed to steal close to $2 million during a forty-year career. He passed away in 1980 at the age of 79. He may be long-gone, and it is likely that he never owned a computer, bu...
Passwords – The Weakest Link in Computer Security
I recall a morning Pre-PC Era 30-some years ago when no one at my office could log onto their mainframe monitors. It seems that our programmer had worked late into the night. Not only had he changed the system password, he forgot to set his alarm clock. Several attempts to contact him were unsuccess...
Spear Phishing
We’ve warned our readers in the past about cyber attacks identified as phishing. Yes, phishing is dangerous for unaware phish. We don’t want that phish to be you. Now the problem is more dangerous. Phishing has escalated to the even more pernicious spear phishing. Phishing Reviewed · ...
The Frighteningly True Cost of Ransomware Part 2 – A Hospital Infected
If you were amazed at the ransomware statistics in the first article in this series, you will be stunned to discover the actual costs of several real ransomware attacks in this and the next several posts. Dateline: Buffalo, NY It usually takes a massive snowstorm to bring Buffalo to a crawl. O...