The Frighteningly True Cost of Ransomware Part 1
You’ve heard the stories. You’ve seen the movies. Someone is abducted and held for ransom. From there the plot thickens and unfolds until, at last, the ransom is paid, the hostage is returned, and the criminals are caught. However, by now you are beginning to understand that ransom in the 21st Ce...
No One Is Immune
Do you remember when the Ebola virus caused world-wide panic a few years ago? The killer virus appeared to be out of control and there wasn’t enough supply of vaccine or enough time to distribute it. Like the script from a sci-fi horror flick, “No one is immune! Ebola is coming to get you!” Of...
Why Small Businesses Should Be Very Concerned About Ransomware Attacks
If you are thinking, “Oh, no. Not another article about ransomware,” you need to read the rest of this report. CNN broadcasted a segment on July 27, 2017, informing viewers why small businesses in particular should be very concerned about potential ransomware attacks. The broadcast stemmed from t...
What in the World Are Hackers Thinking?
We already know what we think when our digital technology has been compromised by some &^%#$* hacker and her (yes, her!) virus, malware, ransomware, or phishing expedition. We get frustrated and downright angry. Have you ever wondered, what the hacker was thinking or what motivated her? We thoug...
Did You Know that Digital Hygiene Can Reduce Cyber Breaches?
Digital hygiene? What’s that? Digital hygiene is a lot like dental hygiene. A dental hygiene regimen helps to protect our teeth and gums from bacteria, infection, and decay. A digital hygiene regimen is necessary to protect our technology and information against infection from viruses, malware, h...
You Are Most Exposed to Cyber Threats When You Think You Are Not a Target
Back in the last decade of the 20th century, an entrepreneur in Orlando proudly, publicly stated that his business was too small to be a target. Granted, he wasn’t talking about cyber threats, but he was talking about other threats to the security of his business. He was wrong. Within a matter of...
Internet Security on the Go . . . Going, Gone
Carrying a laptop, notebook, or other mobile device wherever one goes is so commonplace now that even kids in the backseat have Wi-Fi access to the internet over the river and through the woods to Grandmother’s house. Before you point a finger at the kids, just remember, you started it – and you are...
Why BYOD Makes a Case for Whitelisting
Twenty years ago, no one would have imagined employees bringing their computers to work. In fact, twenty years ago, having a company-owned PC on an employee’s desk was considered a status symbol in some companies. Today, the average person’s cell phone has more technology inside that NASA used to...
The Top 5 Threats to Your Computer Security
A recent publication summarized the Top Five threats to your computer security. Tech Sentries mission is to help you “Guard Your Technology.” One of the ways we do that is by making you aware of potential threats to your computer system. Denial of Service attacks disrupt servers and net...
Protecting Yourself From Email Scams During The Holidays
During the holidays, it’s extra important to be aware of email scams as you’re sending and receiving your holiday gifts and packages. One of the more common scams during this season are the fake delivery notices that you have a package waiting. Consumers are once again reporting this scam...