Home › Blog › Archive
Posts Tagged ‘Safe Network’
Can you trust programs you download? Millions of users, including outsourced computer firms, use a program called CCleaner on their own and on customers’ computers. CCleaner just announced that some of its software was compromised and has been stealing data from users’ computers. Continue reading ‘Your Software, such as CCleaner, May Have Backdoors’
Posted by Mike Foster in Best Practices, CCleaner, Cyber Security Breach, Executive Tips, IT Best Practices, IT Security, Security Breach, Technology Safety Tips, Uninstall on September 19th, 2017.
Tags: CCleaner, cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, hackers, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, malicious code, risk management, Safe Network, Security expert, Security Measures, Software Breach, software risks, Strong Security, tech support, uninstall, unsafe program
Regarding the Equifax breach, the breach affects about half of America’s population, so take action. Experts agree that one of the best things you can do to protect yourself is to place a credit freeze on your credit reports. Continue reading ‘Credit Monitoring is Not Enough – You Must Place Credit Freezes to Protect Yourself’
Posted by Mike Foster in Best Practices, Credit Bureaus, Credit Freeze, Cyber Security Breach, Equifax, IT Security, Technology Safety Tips on September 18th, 2017.
Tags: Credit Freeze, Credit Hack, cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, Dwell Time, Equifax Breach, Experian, FTC, hackers, Identity Theft Tips, Innovis, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, risk management, Safe Credit, Safe Network, Security expert, Security Freeze, Security Measures, Stolen Data, Stolen Identity, Strong Security, tech support, Trans Union
You may be one of the 143 million people affected by the Equifax hacking breach that was announced yesterday.
Data stolen may include contact information, dates of birth, driver’s license information, and Social Security numbers. Attackers can make money selling the information to people who could steal your identity and take out loans in your name.
Place a credit freeze on your credit report. To do so, contact all four: Experian, Innovis, Trans Union, and, you guessed it, Equifax. In total, you’ll spend less than $75 to place the freeze.
A credit freeze stops people for gaining access to your credit report. It is difficult for an imposter to borrow money if a lender cannot check a credit report first.
Remember, credit monitoring, though good, sometimes only catches bad things when it is too late.
A security freeze is more effective, and lasts longer, than a fraud alert.
Additionally, watch out for anything odd or abnormal on your bank statements. Download your credit reports every quarter to see what is on them. One way to see your credit reports is to use a service such as annualcreditreport dot com
The FTC gives suggestions about avoiding and handling identity theft at consumer.ftc dot gov/features/feature-0014-identity-theft
Equifax has set up a website equifaxsecurity2017 dot com for people to see if their information was part of the breach. However, many people have been experiencing problems with that website.
Executives – FYI: Reports say that the attack did not result from social engineering. In other words, nobody clicked a bad link in an email. The attackers got in because an Equifax website was insecure. Have you had someone check the security of your website lately? If your site simply displays static information, you are at a much lower risk than if your site has a place for someone to login and/or look up information via your site.
Reports say that the breach may have happened as early as May, and Equifax discovered the breach on July 29. The time between when attackers compromise a system, and when it is discovered, is called dwell time. The best thing to do is to stop hackers from getting in to begin with. Keep security a top priority at your organization! The attackers are counting on you to overlook important steps.
Please forward this to anyone you care about…
Posted by Mike Foster in Credit Freeze, Cyber Attacks, Cyber Security, Cyber Security Breach, Equifax, Family Cyber Safety, FTC, Identity Theft, IT Security, Security Breach, Stolen Data, Website Security on September 8th, 2017.
Tags: Credit Freeze, Credit Hack, cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, Dwell Time, Equifax Breach, Experian, FTC, hackers, Identity Theft Tips, Innovis, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, risk management, Safe Credit, Safe Network, Security expert, Security Freeze, Security Measures, Stolen Data, Stolen Identity, Strong Security, tech support, Trans Union
NIST, the National Institute of Standards and Technology in the US, is releasing new password standards that make passwords so much easier… Continue reading ‘Make Life Easier – Go Back to Easy Passwords’
Posted by Mike Foster in Best Practices, IT Security, NIST, NIST Recommendations, password, Password Safety, Password Security on September 5th, 2017.
Tags: cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, hackers, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, NIST, NIST passwords, NIST Recommendations, password length, password safety, password suggestions, pw safety, risk management, Safe Network, Security expert, Security Measures, Strong Security, tech support
School is starting again and many students need computers. Take these important steps to help make them more secure: Continue reading ‘Moms, Dads, and Friends: Take 7 Steps to Secure Your Students’ Computers’
Posted by Mike Foster in Adobe Flash, browser security, Family Cyber Safety, hotspot safety, IT Best Practices, IT Security, java, Student Cyber Security, Technology Safety Tips on August 29th, 2017.
Tags: coffee shop wi-fi, cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, Flash, hackers, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, java, parent cyber safety tips, program safety, risk management, Safe Network, sandard users, School computers, school laptop, Security expert, Security Measures, Strong Security, Stucent Computers, student cyber-security, Student Safety, tech support
Expect to see an increase in interesting news stories about what can be hacked this week. The big hacker convention DEFCON starts this week and lots of new announcements will be made as part of the program. Continue reading ‘Hacker Convention Starts Later This Week’
Posted by Mike Foster in DEF CON, Hacker Insight, Hackers, Hacking Competition, IT Security on July 24th, 2017.
Tags: Big Hacker Convention, cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, DEF CON, Hacker Convention, hackers, hackers in Vegas, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, risk management, Safe Network, Security expert, Security Measures, Strong Network, Strong Security, tech support
I was stranded in the Portland airport last night because of a mechanical failure on the first flight. You’ve had similar situations for sure. What would your travel experience be like if the airlines could immediately reset a plane to be brand new if it breaks? Continue reading ‘Fix A Computer in Minutes and It Works Almost Every Time’
Posted by Mike Foster in Acronis True Image, Carbon Copy Cloner, Cyber Security, IT Best Practices, IT Security, Restoring, Security Breach, Shadow Protect Desktop, Technology, Technology Safety, Technology Safety Tips, Technology Tips, Troubleshooting on July 21st, 2017.
Tags: Acronis True Image, Carbon Copy Cloner, cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, hackers, Image backup tools, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, Ransomware recovery, restoring computers, risk management, Safe Network, Security expert, Security Measures, Shadow Protect Desktop, Storeage Craft, Strong Network, Strong Security, tech support, Troubleshooting
Ransomware is a common problem. If an attacker encrypts all your files and demands that you pay ransom to unlock your files, you will want to be able to recover quickly. Regular backups are not enough. Continue reading ‘Recover Quickly if Ransomware Attacks at Remote Worker and Home Computers’
Posted by Mike Foster in Best Practices, Cyber Security, Data Loss Prevention, Disaster Recovery, Home Computers, IT Best Practices, IT Security, Ransomware, Remote Workers on July 14th, 2017.
Tags: Acronis True Image, backups, Carbon Copy Cloner, cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, hackers, Image backup tools, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, Ransomware, Ransomware recovery, Regular backups, remote worker security, risk management, Safe Network, Security expert, Security Measures, Shadow Protect Desktop, Storeage Craft, Strong Network, Strong Security, tech support
The UK is preparing to attack hackers with Army, Navy and Air Force. Continue reading ‘The UK Is Preparing to Attack Hackers with Army, Navy and Air Force.’
Posted by Mike Foster in Cyber Attacks, International Security, IT Security, Sir Michael Fallon, UK on July 3rd, 2017.
Tags: cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, Cyber-Criminals, hackers, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, risk management, Safe Network, Security expert, Security Measures, Sir Michael Fallon, Strong Network, Strong Security, tech support, UK Defense
A new strain of Ransomware, dubbed P e t y a, is gaining momentum infecting companies and home users. Worst of all, in addition to holding files ransom until you pay up, it appears to be infiltrating corporate networks to steal usernames and passwords too. Be sure that you: Continue reading ‘Protect Yourself and Your Organization – New Ransomware Outbreak with Added Poison’
Posted by Mike Foster in Cyber Attacks, Cyber Security, Cyber Security Breach, IT Best Practices, IT Security, Petya, Ransomware, Technology Security on June 28th, 2017.
Tags: Added Poison, Click to Play, cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, hackers, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, PETYA, Ransomware, risk management, Safe Network, Security expert, Security Measures, Strong Network, Strong Security, tech support