Security
Learn to Identify and Eliminate Phishing Notifications
Email may be the most common form of phishing, but it’s not the only one. Modern Web browsers support a technology that enables websites to display system-level notifications just like regular apps. These push notifications have good uses, such as letting frequently updated websites inform users of new headlines, changed discussion threads, and more. Unfortunately, […]
Read More“Juice Jacking” Returns to the News but Still Hasn’t Happened
Much has been made in the media about a recent FBI warning about “juice jacking,” the theoretical act of installing malware on or stealing data from an iPhone connected to a public charging station. Researchers first demonstrated juice jacking in 2011 at the Defcon security conference. There’s no harm in following the FBI’s advice, but […]
Read MoreA Practical Guide to Identifying Phishing Emails
Phishing is becoming an ever more common way for people to get in trouble when using the Internet. A phishing attack is some communication, usually an email, that tries to lure you into revealing login credentials, financial information, or other confidential details. A State of Phishing report from security firm SlashNext claims that there were […]
Read MoreIs Your Wi-Fi Network a Security Risk?
With Wi-Fi security, it’s easy to fall into the “out of sight, out of mind” trap. Your Wi-Fi router probably lives in a corner or closet, and of course, Wi-Fi’s radio waves are invisible. But the ease of connecting your devices to your Wi-Fi network means it’s equally as easy for a hacker to connect […]
Read MoreLastPass Security Breach: Here’s What to Do
Password management company LastPass has announced that it suffered a security breach in which attackers stole both encrypted customer account data (which is bad) and customer vaults containing encrypted usernames and passwords (which is much, much worse). On the positive side, the data of users who abided by LastPass’s defaults and created master passwords of […]
Read MoreIf Your Gift Was a Tech Device, It’s Time to Change the Password!
Whatever consumer electronics product you can name, there’s probably a “smart” version that you configure via an app or Internet-connected interface once you’ve connected it to your Wi-Fi network. For ease of setup and to keep costs down, many such devices come pre-configured with not just a default username and password, but the same default […]
Read MoreUpgrade Past macOS 10.15 Catalina to Keep Getting Microsoft Office Updates
We aren’t quite ready to recommend that everyone upgrade to macOS 13 Ventura, but if you use Microsoft Office with macOS 10.15 Catalina, you should start planning for an upgrade. Microsoft has announced that current versions of its productivity suite—Office for Mac 2019, Office for Mac 2021, and Microsoft 365—will receive updates only if your […]
Read MoreThese New Year’s Resolutions Will Improve Your Digital Security in 2023
Happy New Year! For many of us, starting a new year means reflecting on fresh habits we’d like to adopt. Although we certainly support any resolutions you may have made to get enough sleep, eat better, reduce social media usage, and exercise more, could we suggest a few that will improve your digital security and […]
Read MoreWhat Your Organization Needs to Know About Email Blocklists
Spam remains one of the scourges of the Internet, although spam filters do a pretty good job of keeping most of it out of email inboxes. However, those spam filters can cause deliverability problems for organizations that send email for marketing or customer outreach. One way that happens is if the IP address—the unique numeric […]
Read MoreSecurity Questions Your Organization Should Be Asking Itself
We’re increasingly hearing from organizations that need to establish that they have sufficient security policies in place, either to meet the requirements of a larger client or to qualify for cyber insurance that insures against breaches and similar losses. Details vary, and we’re happy to work with you on the specifics, but here are some […]
Read More