Archive for the ‘Technology Safety’ Category

 

Fix A Computer in Minutes and It Works Almost Every Time

I was stranded in the Portland airport last night because of a mechanical failure on the first flight. You’ve had similar situations for sure. What would your travel experience be like if the airlines could immediately reset a plane to be brand new if it breaks? Continue reading ‘Fix A Computer in Minutes and It Works Almost Every Time’


Straw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve It

Just yesterday, someone told me they think they are secure because they have anti-virus, strong passwords and a firewall.

Last weekend, I asked my daughter to tell me a fairy tale. She chose The Three Little Pigs and the Big Bad Wolf. As she told the story, it became so clear that organizations use straw, sticks, or brick to build their cyber-security protection. See which you are, and how to improve: Continue reading ‘Straw, Sticks, or Brick: How to Tell Which Your Network Is, and How to Improve It’


Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization

It happens all the time: A user clicks on a link in an email message, and the computer gets infected. Ransomware can lock up the data on the drive or even your servers. Sensitive data can be stolen, wire transfers attempted, and other bad things can happen. When a user is tricked into clicking on a bad link, the link instantaneously takes the user to a malicious website. It may even look like a real website or pop-up window. Now the attackers win.

A drastic solution is to Continue reading ‘Finally, a Solution to Solve What May Be the Biggest Cyber Security Risk at Your Organization’


“This is Your Captain Speaking – No Samsung Phones Allowed”

Yesterday afternoon, I and some of the more than 100 other passengers on our jet were paying attention to the safety demo. Unexpectedly, the announcement included a statement that prohibited the use of a Samsung Galaxy Note 7 phone. Additionally, charging such a device is prohibited too. Now that’s harsh… or is it? Continue reading ‘“This is Your Captain Speaking – No Samsung Phones Allowed”’


Sleep Deprivation Makes Attackers’ Dreams Come True

Your team’s healthy sleep stops hackers. Often, an attacker’s primary goal is to trick your workers. Trick them into clicking a link, opening an attachment, or following instructions that supposedly come from their boss. So, one of the best ways to protect your company is Continue reading ‘Sleep Deprivation Makes Attackers’ Dreams Come True’


No More Passwords

How do you feel about giving up passwords entirely? You may have that option soon. Continue reading ‘No More Passwords’


Cyber Security’s Three Essential Steps

In this time of gratitude, which is perhaps the most important foundation of happiness and success, it is important to thank you for helping make the world a safer place. Three controls, perhaps the most important three controls, help protect you from cyber-threats. They are: Continue reading ‘Cyber Security’s Three Essential Steps’


Disaster Recovery Planning – Important New Threat

Most executives know the importance of having, and testing, what they refer to as a disaster recovery plan. If you are serious about protecting your organization from a disaster, and you may owe it to yourself, your family, and your team members, know that PBS released a NOVA video that highlights a real danger we all face. The show is less than an hour long, is available online from PBS, and it is called Continue reading ‘Disaster Recovery Planning – Important New Threat’