general data protection regulation

Do We Need General Data Protection Regulation?

July 24, 2017
Security
On May 25, 2018, the European Union will update privacy laws for all member nations. How that will affect American businesses and individuals is pure speculation at this point. You may be asking, “What does the European Union’s General Data Protection Regulation (GDPR) have to do with me or my bu...
Read More
malvertising

Guard Your Technology Against Malvertising

July 23, 2017
Malware
When you juxtapose “malicious” or “malware” and “advertising,” you get the portmanteau “malvertising.” Although malvertising has existed for about 30 years, it is not yet a household word, even among many computer techs. That is probably going to change following a malvertising attack discovered on...
Read More
ransomware statistics

Alarming Statistics About Ransomware

For some inexplicable reason, each of us tends to believe that we are immune to catastrophic events, including diseases, natural disasters, and crimes. Unfortunately, we carry that same naivete over to guarding our technology. Just as we think that no harm will befall us personally, even though it d...
Read More
guard your technology

Four Simple Ways to Guard Your Technology

Guarding your technology is a narrower way of saying “Protect your assets.” After all, your business’ computers, software, and information are a significant, specific segment of your assets. Worrying about guarding your technology won’t get you anywhere. You have to do something. Think with us fo...
Read More
solid state hard drive

The State of Solid State Drives

July 12, 2017
Backups
Thirty years ago, General Motors introduced solid state voltage regulators that were built into the alternators on its cars. Previously, all voltage regulators were bulky electro-mechanical devices in housed in black metal boxes mounted to the engine compartment firewall or on the top side of a whee...
Read More
Tech Support Scam

This Is Tech Support. You Are About to Be Scammed.

July 6, 2017
Security
Internet usage continues to expand as coverage becomes more available and as users are added by the thousands. Those users include people who do not understand what goes on behind the scenes as well as others who know that they do not know. Scam artists have been around throughout recorded histor...
Read More
Dynamic Whitelisting

From Whitelisting to Dynamic Whitelisting

June 28, 2017
Security
“Fundamentally, we need to change the way we interact with the Internet… This whole reactive approach we’ve taken for years just doesn’t work.” That is the opinion of Frank Dickson, the Research Director for Worldwide Security Products at International Data Corp. He was talking about the need for...
Read More
what is whitelisting?

The Wisdom of Whitelisting

May 18, 2017
Security
Do you remember the good old days when we were able to tell the bad guys from the good guys on TV westerns by the color of their hats? Cyber vocabulary includes the term “black hat.” It is derived directly from those old westerns and those dirty, low-down, dastardly villains. Today, the term is u...
Read More
Google Phishing Scam

Don’t Take the Google Docs Phishing Scam Bait

When your Daddy taught you to fish, he taught you how to bait the hook. The secret is to make the bait so alluring that the fish doesn’t sense the hook. Sometimes it works. Sometimes it doesn’t. Kind of makes you wonder if some fish didn’t pay attention when they were swimming in their schools. W...
Read More
1 2 3 4 5 8