Posts Tagged ‘hackers’

 

New York City is Providing Automatic Protection for all iPhone Users, and So Can Your City

As the City of Atlanta is still recovering from the massive ransomware attack on March 22, NYC is launching a program that provides secure Internet access for residents and visitors at no charge. Continue reading ‘New York City is Providing Automatic Protection for all iPhone Users, and So Can Your City’


A New Opportunity for Your IT Pros to Protect your Servers

Attackers can take advantage of a large attack surface on your servers. Your IT professionals can drastically reduce the attack surface, and potentially save you money. Continue reading ‘A New Opportunity for Your IT Pros to Protect your Servers’


How Buying a Spare Printer can Vastly Improve Your Cyber Security

Imagine a scenario when an IT professional knows there is an urgent security problem in your firewall that needs to be addressed. And at the same time, your multi-function printer is broken. What problem will the IT professional address first? Continue reading ‘How Buying a Spare Printer can Vastly Improve Your Cyber Security’


Patching Nightmare – Please Forward to Your IT Pros

Intel says, again, to stop deploying patches. Java and other new patches need handling. Continue reading ‘Patching Nightmare – Please Forward to Your IT Pros’


Three Serious Trends to Watch Out for in Cyber Security

First, are your servers backed up to the cloud? The use of online backup will continue to grow. Organizations are finding out, sometimes the hard way, Continue reading ‘Three Serious Trends to Watch Out for in Cyber Security’


Major Flaw in Computer Processors Affects Security

A security vulnerability, that has existed for 10 years, has only recently been discovered. Continue reading ‘Major Flaw in Computer Processors Affects Security’


Protecting and Restricting iPads, iPhones, and Android Devices

Because many families, and business professionals, received new tablets for the holidays, it is important to consider security. Families, as well as businesses, may choose to restrict permissions on devices. Here’s how: Continue reading ‘Protecting and Restricting iPads, iPhones, and Android Devices’


About Half of All Breaches are Caused by a Contractor or Service Provider

In our experience of auditing after breaches have happened, about half were caused by a service provider working for the company that gets breached. Continue reading ‘About Half of All Breaches are Caused by a Contractor or Service Provider’


One Setting Can Protect Your Network from Ransomware

Once an attacker accesses one computer, they attempt to traverse the network and infect other computers too. That’s how ransomware spreads on a network. Continue reading ‘One Setting Can Protect Your Network from Ransomware’


Mac Vulnerability Permits Unauthorized Login

Apple’s newest operating system has a serious vulnerability that can allow someone else to logon to your Mac. Here’s what to do:  Continue reading ‘Mac Vulnerability Permits Unauthorized Login’