Linked Account Horror Stories
In the past, right here on this very blog, articles on password security have talked about the use of the same password or login across multiple platforms. In today’s world of linked accounts, such password security can be very dangerous. However, a new type of attack related to social engineering can lead to attacks once […]
So, you want to be your own IT professional?
Information Technology (IT) is the practice of using computers to store, retrieve, manipulate, transmit, and communicate data. Humans have been doing this since writing was first developed back in about 3000 BC. IT encompasses technologies such as computer hardware, software, electronics, internet, e-commerce, computer services, networks, telecom equipment, and much more. And IT professionals deal […]
What happened to Office Starter?
The Microsoft Office suite is a very powerful tool. Everybody knows that. In fact, a large number of clients define their email by “Outlook” instead of the company or platform that actually defines their email (Exchange, Gmail, random web service). There is no doubt that Excel and Word are wide-ranging in their impact and the […]
Christmas 2013 – Do I get a smartwatch?
Christmas time is a wonderful time of year for technophiles. Every new gadget has a new model or version ready for purchase. From video games and TVs to cell phones and…now…watches. Say goodbye to the Casio of the past, clocks for your wrist have officially entered the 21st century. We have seen the future in […]
Has Someone Offered to Hold Your Data… for a Fee?!
Christa Hartman recently posted a blog about the threat of ransomware. Check out the informative two part blog here and here. Please be aware of a new version that has recently become more prevalent infecting computers across the internet. The United States Computer Emergency Readiness Team released a report documenting CryptoLocker Ransomware. Ransomware has become […]
What if your PC was held for ransom… Part 2
Recently, I posted a blog on ransomware – a form of malicious software that can hold your computer and data files hostage until a ransom is paid. I listed a couple things you can do to minimize the risk of being infected by these types of attacks. And at the end, I left you with […]
What if your PC was held for ransom….. Part 1
As if viruses, worms, Trojan horses, malware, and phishing scams aren’t bad enough, there is another form of malicious software out there that can hold your computer and data files hostage – ransomware. This type of malware denies you access to your computer or files until you pay a ransom. It is an extortion racket […]