There has been a lot of activity on the internet where people are being scammed out of their money. Now this is nothing new and every year, there are new attacks coming out. Do you remember the Nigerian Prince? He was willing to transfer millions of dollars into your account to secure his freedom. Once collected and transferred, he would share a portion with the kind hearted person willing to help out? What happened is instead, thousands of people fell victim to having bank accounts cleared out with hardly a trace to recover lost funds. Nowadays, it is the Tech Support Scam. You surf online when a warning comes up that your computer is infected with a virus and that you should call [...]
We are in the peak of the Hurricane season here in the south east so it’s important that everyone is paying special attention to the technology equipment in our homes and businesses.
Hurricane Watch (36-24 hours prior to landfall)
During this period you should begin preparing all non-essential equipment and infrastructure including all PC’s, printers and monitors. All software manuals and technology should be stored away from windows and as far away from the floor as possible ideally in a sealed weatherproof container or safe. Run a final backup on all servers prior to shutting them down. Keep in mind – backups can take several hours to complete so [...]
Password guidelines supplied by NIST (The National Institute of Standards and Technology) have changed. The current password complexity rules require an uppercase character, lowercase character, numbers, and symbol that would need to be changed every 90 days. The issue with this guideline is that people have a hard time remembering these passwords and would write them down (Security violation because unwanted people could gain access to sensitive information) or incrementally change a number or character to essentially keep the password as close to the original as possible. This would cause a headache with many system administrators because of constant resetting of passwords [...]
Meet the “New Standard” for Business Email
Email has been around for over 40 years and in that time, it has gone from being a “useful tool” to being a critically important business application.
Although the underlying technology has remained stable and proven during this time, the ecosystem around email has changed significantly and dramatically. New and unavoidable vulnerabilities have come to the forefront, making it crucial to take a fresh approach at managing email.What’s Wrong With The “Old” Way?
When the first email protocol was developed back [...]