Archive for the ‘Best Practices’ Category

 

One Setting Can Protect Your Network from Ransomware

Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network. Continue reading ‘One Setting Can Protect Your Network from Ransomware’


Please Alert Your IT Pros – Increase Your Security Log File Capacity

Windows computers can keep a log of security events, such as failed logon attempts. It is helpful to know if attackers are trying to gain access to your network. When the log fills up, it overwrites itself with the oldest events first. By default, the log files are very small, and that makes it much easier for attackers to cover their tracks. Continue reading ‘Please Alert Your IT Pros – Increase Your Security Log File Capacity’


Do the Basics. Do not Believe that Threat Protection Software Will Save You.

This week, someone told me about a group of CEOs who came to the conclusion that their IT security was handled since they installed an artificial intelligence (AI) based threat protection tool. They didn’t know it, but they were wrong.  Continue reading ‘Do the Basics. Do not Believe that Threat Protection Software Will Save You.’


New iPhone and iPad iOS 11 Can Quietly Override Your Attempt to Be Secure

The new Apple iOS 11 has a feature that appears to permit you to turn Wi-Fi on and off from the easy to reach Control Center. However, some people in the security community are concerned since the setting does no such thing. Continue reading ‘New iPhone and iPad iOS 11 Can Quietly Override Your Attempt to Be Secure’


Your Software, such as CCleaner, May Have Backdoors

Can you trust programs you download? Millions of users, including outsourced computer firms, use a program called CCleaner on their own and on customers’ computers. CCleaner just announced that some of its software was compromised and has been stealing data from users’ computers. Continue reading ‘Your Software, such as CCleaner, May Have Backdoors’


Credit Monitoring is Not Enough – You Must Place Credit Freezes to Protect Yourself

Regarding the Equifax breach, the breach affects about half of America’s population, so take action. Experts agree that one of the best things you can do to protect yourself is to place a credit freeze on your credit reports. Continue reading ‘Credit Monitoring is Not Enough – You Must Place Credit Freezes to Protect Yourself’


Make Life Easier – Go Back to Easy Passwords

NIST, the National Institute of Standards and Technology in the US, is releasing new password standards that make passwords so much easier… Continue reading ‘Make Life Easier – Go Back to Easy Passwords’


Recover Quickly if Ransomware Attacks at Remote Worker and Home Computers

Ransomware is a common problem. If an attacker encrypts all your files and demands that you pay ransom to unlock your files, you will want to be able to recover quickly. Regular backups are not enough. Continue reading ‘Recover Quickly if Ransomware Attacks at Remote Worker and Home Computers’


Patching – 10 Steps to Seal the Holes in Your Armor

You’ve likely heard of the massive ransomware attack that has taken down so many organizations, including hospitals, around the world. The ransomware appears to have exploited a bug for which Microsoft released a fix a little over a month ago. Follow these 10 steps to help protect your organization from this, and from future attacks: Continue reading ‘Patching – 10 Steps to Seal the Holes in Your Armor’