Posts Tagged ‘IT security procedures’

 

You Might Stop Receiving Essential Email Messages, and What to Do About It

If someone ever impersonates you via email, you may stop receiving legitimate email messages too. Computers belonging to people who received a fake email message may automatically send all new messages to the phony address instead of yours. Senders don’t realize what is happening, and you stop receiving essential email messages. Continue reading ‘You Might Stop Receiving Essential Email Messages, and What to Do About It’


Stealing Tesla Cars, and Stealing Your Network with Agent Tesla

The 3 minute Tesla car stealing video is fun, and keep reading the next paragraph about your organization’s security too. Continue reading ‘Stealing Tesla Cars, and Stealing Your Network with Agent Tesla’


Can you Trust the Kindness of Tech Support Strangers?

If you place a call to tech support for your online accounting software or any program, and if the technical support representative on the phone asks you to download a diagnostic program to test your computer, think twice.
Continue reading ‘Can you Trust the Kindness of Tech Support Strangers?’


The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else

Imagine that you have a fleet of dozens of expensive vehicles, and you keep all of their keys in a locked cabinet. There is a master key that opens the cabinet.

You assign your IT team Continue reading ‘The Insanity of Your Network – Storing Keys in the Same Place as Everyone Else’


Watch for Threatening Email Messages that Contain Your Actual Passwords

You may receive a threatening email message that shows you your actual username and password. The attacker may demand you pay them 2900, or some other significant amount. They threaten horrible things if you do not pay. Continue reading ‘Watch for Threatening Email Messages that Contain Your Actual Passwords’


Stop Hidden Attacks Buried in Email Attachments

When you receive an email attachment, even when you are expecting the document and know the sender, the attached file can be poisoned.  Continue reading ‘Stop Hidden Attacks Buried in Email Attachments’


Ask IT Pros to Check Your Routers and Firewalls

We audited a company last week and discovered that their web filtering tools, designed to stop users from accidentally landing on malicious websites, was not blocking dangerous sites. In these days with ransomware and bad actors tricking users into clicking on dangerous links, it is essential to have web content filtering in place. Continue reading ‘Ask IT Pros to Check Your Routers and Firewalls’


How to E-Mail Encrypted Attachments

E-mail messages can be intercepted or read by an unauthorized individual. Continue reading ‘How to E-Mail Encrypted Attachments’


A Simple Change Can Help Protect Your Family, and It Works on Apple and Windows

There is a setting on your computer that can help protect your family. Continue reading ‘A Simple Change Can Help Protect Your Family, and It Works on Apple and Windows’


New York City is Providing Automatic Protection for all iPhone Users, and So Can Your City

As the City of Atlanta is still recovering from the massive ransomware attack on March 22, NYC is launching a program that provides secure Internet access for residents and visitors at no charge. Continue reading ‘New York City is Providing Automatic Protection for all iPhone Users, and So Can Your City’