How to deal with Ransomware.

Deal with Ransomware

I want to come back to this topic on how to deal with Ransomware. This is because I keep meeting business people in the training that I deliver who, either…

Read More

Vulnerable Shopping Carts lead to Credit Card breaches

Vulnerable Shopping Carts

You may have heard about the Ticketmaster data breach earlier this summer. You probably also have heard about the British Airways data breach at the start of this month. A new breach…

Read More

Posh POS was Compromised

POS was compromised

A headline worthy of The Register and I’m surprised they didn’t grab it. So what POS was compromised? Well none other than Saks Fifth Avenue, Saks Off Fifth and Lord &…

Read More

Simple Security Planner tool for EVERYONE!

Security Planner

I love it when I get to tell people about another great security tool. This simple Security Planner tool is another FREE resource that can really help protect you, your…

Read More

Quad9 – Safer addressing on the internet

Quad9 Safer Addressing

I sometimes grow weary of the never ending stories of the bad guys being successful. Quad9 is a free Domain Name Service (DNS) from the good guys that should make…

Read More

The latest Ransomware outbreak – Petya

Petya / NotPetya / Petna

So here we go again with another outbreak of Ransomware, based on the National Security Agency (NSA) hacking tools that were leaked by a hacking group. Some experts are calling…

Read More

Do you WannaCry? I didn’t think so.

Do you WannaCry?

I delayed this week’s blog, just to let some of the dust settle on the whole WannaCry (also known as WCry or WannaCrypt) furore and see if we can learn…

Read More

Take a 2-Minute Privacy check-up.

2 Minute Privacy Check-up

After last week’s brief shenanigans with GMail getting phished badly and the recommendation I made about how to help correct and protect yourself from that nasty piece of work, I…

Read More

Protect your on-line accounts, but not with text messages.

Protect your accounts

As I outlined here, if you are using on-line accounts for e-mail, social media, etc. then one of the strongest means of protecting yourself from the evil doers is to use,…

Read More

X. Thou shalt only use the official app store for apps.

Summary: This commandment is more targeted at the mobile device side of technology, but app stores are spreading into the desktop/laptop areas by way of Windows Store for Windows 8.1…

Read More

IX. Thou shalt never insert nor allow to be inserted, a USB memory stick that thy hath never had complete control of since it was removed from its packaging.

Summary: This is an easy commandment to follow, but there might be temptation to breach it for convenience.  If you find a USB memory stick on the street or in…

Read More