Blog

Don't fall for this email quota limit phishing scam

Have you ever received an email with "Microsoft Outlook 365: Your email quota almost exceeded limit" in the subject line? I recently received one of these emails to my business email address. The email warned that not only I was not only in danger of exceeding my Outlook mailbox limit but that I needed to "review recent activity" in the interest o...

Protecting your business from Meltdown and Spectre attacks

For the past week, the news has been filled with mentions of Meltdown and Spectre. These ominous names were given to two separate hardware vulnerabilities discovered in millions of the processors used not only in personal devices (e.g. laptops and tablets) but also in the servers behind business-critical cloud services.  While the situa...

Phishing for Corporate Gold with Social Engineering Attacks

Completing our look at the 7 common-sense cyber protections with #5 and #6: #5 DO NOT open emails, links, or attachments from strangers – especially if the email demands urgent action from you. Stop and think, that email could be a "phishing" email from a cyber attacker #6 DO NOT give any of your usernames, passwords, or other computer...

Instant Efficiency Gains With Updated Active Directory Data

Millions of businesses around the world either have used or are using Microsoft Active Directory (AD) services on their corporate networks. Used to identify and manage authorized network users, AD has been around for over fifteen years. However, few companies take full advantage of AD's capabilities in the social media age. With a few simple tweak...

Just what is a complex password (and how do I create one)?

In a previous blog, I discussed seven common-sense cyber protections you can do that immediately and inexpensively make you, your business, and your family safer from cyber attack. So far, I've covered #1 – Keep your software patches up to date and #7 – Do not give your primary user account administrator privileges, and #3 – Back up your computer ...

Which is worse: #ransomware or hard drive failure?

It’s a trick question. Both impact your business the same way – you lose access to your valuable business data when you are not expecting it. One of the most important things you can do about cybersecurity is to stop thinking about it like a mysterious disease whose only cure is to buy specialized protection software. To be sure, some businesses that...

7 Common-Sense Cyber Protections That Really Work

We all use the Internet regularly to communicate with colleagues, share vital information, and carry out our business duties. Think of trying to get through your workday without access to your e-mail, your documents, or your spreadsheets. Nevertheless, that same Internet we depend upon is viewed by cyber criminals as a pathway into your company – one ...

The 2 Things That Best Protect You From Cyber-Attack

We are excited to announce a NEW guest blog series by Dr. Ken! In future blog posts, he will discuss ransomware, encryption, and other critical cyber-security issues all business people need to know. Stay tuned! UPDATE Friday May 12, 2017: Massive ransomware cyber-attack hits 74 countries around the world says a headline in today’s UK Guardian news...

The Walled Garden

Safety in numbers. It is a proven survival principle that has, well, survived for eons. Encapsulated in this principle are many worthy lessons, such as implicit trust and resource pooling. These lessons are easily seen in the security concept of a Walled Garden. This defense model can be traced back to when 17th century townships were designed aro...

The Surprising Reasons Small to Midsized Businesses Are Moving to Windows 10 Enterprise

Owners of small-to-midsized businesses (SMBs) view their information technology (IT) as a necessary evil. For example, most SMBs dread the cycle of upgrading old laptops and desktops every few years (IDC notes that PC sales in 2017 are the strongest they've been in five years) to keep up with the latest version of Microsoft Windows. For decades, l...