October is Cyber Security Month. Are you doing your part to stay safe online? “Do Your Part. #BeCyberSmart.”
What Is Emotet ?
What’s Emotet? It is one of the most infectious and costly viruses ever unleashed. It was initially written in 2014 to steal banking information by intercepting internet traffic. With the release of version 3, it now has the ability to brute force admin credentials and infect all systems on a network. It also opens the door for tons of malware…
One of the most infectious and costly viruses every released
Shutting Down Doesn’t Fully Shut Down Windows 10 ( But Restart Does)
CHRIS HOFFMAN @chrisbhoffman APRIL 18, 2018, 6:40AM EDT When you click “Shut Down” on your Windows 10 PC, Windows doesn’t fully shut down. It hibernates the kernel, saving its state so it can boot faster. If you’re experiencing computer problems and need to reset that state, you’ll need to restart your PC instead. We’ve…
Top 10 IT Security Threats
Insider Threats – Someone in the organization either knowingly or inadvertently gives access to company data. Viruses and Worms – These can wreak havoc on a network costing the business downtime, lost productivity and money Botnets – Users unwittingly allow their computers to become part of a network that is used to launch Distributed Denial of Service Attacks. The computers are commanded…
Layered Security
What is layered security ? It’s a methodology to defend computer systems in layers rather than with just one source of security. For a business, it should look like this: ISP – At the Internet Service Provider layer, there should be some type of security built into what specific traffic they will allow in and out of their networks. If your…
How did the hackers get my Office365 account credentials? How to avoid being a victim of cybercrime
We all get a lot of email almost daily. You really must be on your toes when checking it. Something from an unknown sender with a link. DELETE. Something from your boss but his email is not correct. DELETE. In this day and age, you must be suspicious of everything that comes in. One of the tricks hackers are using to get…
Office 365 is a Great Platform for Small Business
Because of the Corona virus, ACME Law, Inc., had all its employees coming into the office on staggered shifts. Jill would work 2 days in a row, then Shannon would work the others. Tom, the owner of the firm was working remotely and realized this could work for others in the firm instead of driving into the office. …
ZOOMBOMBING
Internet Security The number one IT question is……Is it secure? If its online, then chances are, no. With Covid19 disrupting our lives many organizations, businesses, and schools are using Zoom for video conferencing. Is it secure? In a word, no. Zoombombing is an attack that hackers use to disrupt Zoom meetings. They can either just…
Fake Domain Email Scams
After years of business with a company emailing back and forth with the bookkeeper on past due invoices you realize one of the invoices they are asking about was paid. You were asked by email to send the check to a totally different address and person than normal. You didn’t think too much about it…