by david | Dec 7, 2021 | IT Blueprint, Password Manager, Privacy, Security, Technology
When he slips into a phone booth, Tekmar Password Man. becomes Log Me In’s Rescues Last Pass Man. After careful annual analysis we are recommending and offering Last Pass for password management. Here is why. Autosave and autofill to reliably capture every...
by david | Nov 11, 2021 | Security, Technology
New Federal Cyber Infrastructure President Biden signed the Infrastructure Investment and Jobs Act on November 10. In total, the bill dedicates $1.9 billion in funding to address cybersecurity threats to national, state and local government infrastructure. The money...
by david | Nov 3, 2021 | Privacy, Security, Technology
The scariest thing about the largest botnet in 6 years, observed, is the part about observed. Don’t let a botnet herder use your systems. The observation was in China in late 2019 and most of the infected nodes were there. This short article discusses a...
by david | Sep 5, 2021 | Security, Technology
Extra vigilence on holiday’s phishing ransomware excursions for people with systems to to exploit human weaknesses. Be careful is the bottom line. CISA AND the FBI urge people to vigilent, ransomware and it’s promary attack vector are exploited...
by Dan Siebert | Aug 26, 2021 | Security
The Problem: Where Will the Next Attack Strike? Your business processes consist of multiple layers supported by your IT environment, each of which can be targeted by advanced cybercriminal tactics. These layers include: Your internet use Your network Your employees...
by david | Jul 13, 2021 | Security, Technology
They may change their entities name, yet the threat they created and profited from continues. We know software as a service well from mainstream technologies widely used today. Organized crime has adopted the same business model distributing their exploits to anyone...