Like every year for technology, 2019 will continue to see changes. Not just because 2019 is anything special, but because it’s also right before 2020. We see trends continuing that large software companies are forcing smaller companies into a cloud-based model (think Amazon and Microsoft), web applications that are hosted in the cloud are the […]
Author: Jordan Smith
Browser Extensions… Beware of Using Them
In a recent article in the BBC, they mentioned how 81,000 users private messages have been leaked and posted for sale on the dark web (See article). The article mentioned how the hackers got into their Facebook accounts by using browser extensions, “Personal shopping assistants, bookmarking applications and even mini-puzzle games”. Be cautious when you […]
Getting Conned… Twice | New Ransomware Technique
Really Interesting article about a ransom-ware strain that encrypts your computer, and then asks for admin credentials to your computer in order to decrypt the files! Don’t do it! In effect, you are getting conned twice. The first time they got your files, the second time they could have everything!!! Article: https://www.bleepingcomputer.com/news/security/commonransom-ransomware-demands-rdp-access-to-decrypt-files/
What is Sandboxing?
SANS published an interesting article (see below) showing that Windows Defender is now supporting sandboxing. So what is sandboxing? And why is this a good thing. “Sandboxing is a software management strategy that isolates applications from critical system resources and other programs.” – Tech Definition. Sandboxing allows applications and code that come into your system […]
Don’t use these passwords… please
We’ve all heard many times how important passwords are, here are a list of common passwords people use, please don’t use these as it will make breaking your password really easy. Season + year (e.g. Winter 2018) Local Sports Team + Digits (e.g. Seahawks3) Company Name +Year/Number/Special Character (e.g. VeloxSystems2018@) So how do you compile a good […]
Why Do We Do and Say Dumb Things Online?
BBC has an interesting article about a 16 year old who is pleading guilty to hacking into Apple’s network. This kid “boasted about his activities” and broke into their network because “he was a huge fan and dreamed of working there.” There is something that happens when you’re behind a computer (it’s called The Online […]
Y2K – Real or Myth?
Interesting article from BBC discussing if Y2K was a myth… conclusion: no, it wasn’t, the only reason it was a HUGE problem, was because of IT folks who spent countless hours preparing for it. Basically it would have been a big deal, but they realized that before it happened. “The prudent sees danger and hides […]
Data Breaches: What’s Actually Reported
Are you still shredding your bills and blacking out your address on envelopes. I hope not. In this day and age your much more likely to lose you information from a data breach than from someone dumpster diving… and c’mom, I can just google your address to find out who lives there. Check out this […]
How Quickly Cyber Criminals Can Take Over
In a recent BBC article, they explain how easy it is for cyber criminals to take over a vulnerable server. And don’t think they aren’t targeting little guys, because they are using automated tools, you’re just as vulnerable as a Fortune 100 company for many attacks. A test was done by a company that does […]
Ransomeware Still a Big Problem
In a recent article from the BBC, they discuss the fact that ransomware is still a huge problem, accounting for 40% of successful breaches. Not only that, but the criminals are targeting small firms too! [See Article Link Below] So, what can you do about? Make sure your employees are well trained in how to […]