by david | Jul 13, 2021 | Security, Technology
They may change their entities name, yet the threat they created and profited from continues. We know software as a service well from mainstream technologies widely used today. Organized crime has adopted the same business model distributing their exploits to anyone...
by david | Jul 10, 2021 | Clouds, Privacy, Security, Technology
Staying safe from phishing handnook part 2 – Anti-Phishing Strategy The Handbook for Staying Safe from Phishing part one lays out an awareness that is essential to an anti-phishing strategy. An awareness of the types and methods help form a coherent functional...
by Dan Siebert | Jul 8, 2021 | Security, Technology
Printnightmare has kept IT and systems staff alerted for the past week. It was originally attributed to: An accidental leak Leaking the details for this vulnerability happened by accident, out of a confusion with another issue, CVE-2021-1675, also impacting Print...
by Dan Siebert | Jun 10, 2021 | Clouds, Data Backup and restore, IT Blueprint, Password Manager, Security, Technology, Training
Phishing remains the primary cybersecurity threat to businesses and individuals using networked devices. It serves as a gateway for criminal enterprises, exploiting techniques often used by legitimate applications, which complicates detection. To combat this,...
by Dan Siebert | May 12, 2021 | Clouds, IT Blueprint, Privacy, Security, Technology
One Clue to dark side’s origins is that the problems are deeper and not as dark as some make out. Dark makes it sound like there is not enough light obscuring what’s going on in attacks like the one on Colonial Pipelines. There is more than knowledge...
by david | Mar 13, 2021 | Password Manager, Security, Training
An alert pops up on your computer: It’s time to change your password again. Sigh. Fine. You’ll just change from password4! to password5! and— Not so fast. Regular password changes are meant to make sure that even if someone gets your login credentials, they won’t be...