There has been a lot of activity on the internet where people are being scammed out of their money. Now this is nothing new and every year, there are new attacks coming out. Do you remember the Nigerian Prince? He was willing to transfer millions of dollars into your account to secure his freedom. Once collected and transferred, he would share a portion with the kind hearted person willing to help out? What happened is instead, thousands of people fell victim to having bank accounts cleared out with hardly a trace to recover lost funds. Nowadays, it is the Tech Support Scam. You surf online when a warning comes up that your computer is infected with a virus and that you should call [...]
We are in the peak of the Hurricane season here in the south east so it’s important that everyone is paying special attention to the technology equipment in our homes and businesses.
Hurricane Watch (36-24 hours prior to landfall)
During this period you should begin preparing all non-essential equipment and infrastructure including all PC’s, printers and monitors. All software manuals and technology should be stored away from windows and as far away from the floor as possible ideally in a sealed weatherproof container or safe. Run a final backup on all servers prior to shutting them down. Keep in mind – backups can take several hours to complete so [...]
Password guidelines supplied by NIST (The National Institute of Standards and Technology) have changed. The current password complexity rules require an uppercase character, lowercase character, numbers, and symbol that would need to be changed every 90 days. The issue with this guideline is that people have a hard time remembering these passwords and would write them down (Security violation because unwanted people could gain access to sensitive information) or incrementally change a number or character to essentially keep the password as close to the original as possible. This would cause a headache with many system administrators because of constant resetting of passwords [...]
Meet the “New Standard” for Business Email
Email has been around for over 40 years and in that time, it has gone from being a “useful tool” to being a critically important business application.
Although the underlying technology has remained stable and proven during this time, the ecosystem around email has changed significantly and dramatically. New and unavoidable vulnerabilities have come to the forefront, making it crucial to take a fresh approach at managing email.What’s Wrong With The “Old” Way?
When the first email protocol was developed back [...]
There are three levels of ransomware. Ransomware is a type of malicious software which is designed to block your access to your computer until you pay a specific amount of money.
1.) Scareware – These are lowest on the totem pole and include fake anti-virus and anti-malware clients detecting non-existant issues and demanding money for the program to fix it.
2.) Browser/Screen locking ransomware – Think of the FBI moneypack virus where they claim to have detected illegal activity on your computer and demand a “fine” to prevent further prosecution.
3.) Encrypting ransomware – This ransomware is the worst of the worst and encrypts all [...]
WiGig (802.11ad)is a wireless standard developed by the Wireless Gigabit Alliance and it’s designed to have significantly faster wireless network speeds. It will be available on consumer devices beginning this year. While it will not be replacing WiFi completely due to it’s extremely short range we will definitely see it in use for local networks replacing some of the network backbone. The earliest you’ll need to start worrying about WiGig will be the second half of 2017.
Ordinary WiFi is cheaper and more reliable for most of us but with the influx of wireless displays, VR headsets, phones and 4K video and TV’s our airwaves are getting crowded which is [...]