Archive for the ‘Data Loss Prevention’ Category

 

When Trusted Programs get Hacked: An Attacker May Be Putting Germs on Your Toothbrush

It is like someone borrowing your toothbrush without you knowing, and you get sick from their germs. Think of programs on computers as being something that can be used to make you sick. As 2018 continues, more attackers will use trusted software as a vector to infect networks. Continue reading ‘When Trusted Programs get Hacked: An Attacker May Be Putting Germs on Your Toothbrush’


Three Serious Trends to Watch Out for in Cyber Security

First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way, Continue reading ‘Three Serious Trends to Watch Out for in Cyber Security’


One Setting Can Protect Your Network from Ransomware

Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network. Continue reading ‘One Setting Can Protect Your Network from Ransomware’


Please Alert Your IT Pros – Increase Your Security Log File Capacity

Windows computers can keep a log of security events, such as failed logon attempts. It is helpful to know if attackers are trying to gain access to your network. When the log fills up, it overwrites itself with the oldest events first. By default, the log files are very small, and that makes it much easier for attackers to cover their tracks. Continue reading ‘Please Alert Your IT Pros – Increase Your Security Log File Capacity’


Recover Quickly if Ransomware Attacks at Remote Worker and Home Computers

Ransomware is a common problem. If an attacker encrypts all your files and demands that you pay ransom to unlock your files, you will want to be able to recover quickly. Regular backups are not enough. Continue reading ‘Recover Quickly if Ransomware Attacks at Remote Worker and Home Computers’


Straw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve It

Just yesterday, someone told me they think they are secure because they have anti-virus, strong passwords and a firewall.

Last weekend, I asked my daughter to tell me a fairy tale. She chose The Three Little Pigs and the Big Bad Wolf. As she told the story, it became so clear that organizations use straw, sticks, or brick to build their cyber-security protection. See which you are, and how to improve: Continue reading ‘Straw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve It’


Get Apple’s Urgent Patches that Fix Dozens of Security Holes

For those of you with Apple products, Apple just released some important updates.

Knowing that updates might cause a problem, please back up your computer first. You are backing up all the time already, right? Time Machine is a wonderful tool and is built in. If you want to supplement Time Machine with an additional backup, Carbon Copy Cloner from Bombich dot com is very popular and clients experience great results. You’ll need a couple of external USB drives, but the investment is worth it.

In case you are not familiar with how to apply patches, here are instructions:

On your Apple computer, even if your computer is set for automatic updates, it is good to verify that you have the most recent patches. Click on the image of the apple in the top left corner, and choose App Store. If not already selected, choose Updates inside the title bar that already contains the words: Featured, Top Charts, Categories, Purchased, and Updates. You may see many updates for your applications, and those are fine to apply, but the urgent one is the update called macOS Sierra Update and the version is 10.12.5. If you’ve not updated in a while, you may see other macOS updates too.

iPhone and iPad users, press on the Settings icon that looks like a gear. In the left-hand column, select General, and you’ll see Software Update on the right-hand column near the top. The most recent patch is for iOS 10.3.2.

If you want to configure automatic updates for your Apple computers, find instructions by searching for this phrase in Google: Automatic security updates os x site:apple.com

If you want to configure automatic updates for the iPhone and iPad, find instructions by searching for this phrase in Google: Automatic security downloads iOS site:apple.com

Please forward this to everyone you know who uses Apple devices and you want to help be more secure…


Patching – 10 Steps to Seal the Holes in Your Armor

You’ve likely heard of the massive ransomware attack that has taken down so many organizations, including hospitals, around the world. The ransomware appears to have exploited a bug for which Microsoft released a fix a little over a month ago. Follow these 10 steps to help protect your organization from this, and from future attacks: Continue reading ‘Patching – 10 Steps to Seal the Holes in Your Armor’


Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization

It happens all the time: A user clicks on a link in an email message, and the computer gets infected. Ransomware can lock up the data on the drive or even your servers. Sensitive data can be stolen, wire transfers attempted, and other bad things can happen. When a user is tricked into clicking on a bad link, the link instantaneously takes the user to a malicious website. It may even look like a real website or pop-up window. Now the attackers win.

A drastic solution is to Continue reading ‘Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization’