Premium Passwords: Your Guide To Keeping Your Accounts Safe

Crafting useful passwords requires the use of obscure topics, characters in place of numbers, constant variation, and other tactics Cybersecurity is so often described as an automated process that we forget the human element. Even the most sophisticated security program is only as effective as human users allow it to be. One of the most…

Read More

House IT Staff Investigated for Unauthorized Access

Five IT staff members used their access to the House of Representative’s computer network to skim sensitive information, gain unauthorized access to the system and purchase unapproved items for unsuspecting members of Congress.   A small staff that provides IT support to the House of Representatives is under investigation for dubious actions involving the government’s…

Read More

Wisdom Wednesday: Out Of Office In Microsoft Outlook

How Do I Set My Out Of Office In Microsoft Outlook To Only Send From One Date To Another? In Outlook, click on File, Info then select Automatic Replies (Out of Office). Click on Send Automatic Replies and check the Only send during this time range check box. Specify a start and end time for…

Read More

Cops and Hackers: Disappearing Evidence and Disrupted Systems

Hackers go after money, information, elections — and even evidence. Learn more about how one police department lost 8 years worth of information all because of one idle click of a mouse. The more of our lives we put on a computer, the more valuable that computer becomes. Police departments across America store information about…

Read More

No Business Is Immune To The Devastation Of Data Loss

Data is your business’ most valuable asset, which makes protecting it a critical piece of your business’ IT security measures. Data loss can happen as result of a wide range of causes, some preventable, and some completely unexpected. Having reliable and up-to-date data backups available to you when disaster strikes can often be the only…

Read More

How a Fake Battery App Demonstrates the Spreading Risk of Ransomware

A fake battery life boosting app available through the Google Play store distributed a newly-emerged ransomware, highlighting the threat that ransomware poses even on official app stores. A number of users of the official Google Play store were unpleasantly surprised recently after downloading a fake Android app posing as a battery life booster. Named Charger,…

Read More

97% of Your Emails Are Spam: What You Should Be Doing With Them

With 60 billion emails being sent out a day, it should come as no surprise that not all of them are legitimate messages. Find out more about the story behind the spam, and what you can do to stop yourself from becoming a victim. You may see spam as an annoyance rather than a danger,…

Read More

Is Your Home Really Secure?

Don’t take your home security for granted. Burglars are not only incredibly fast but also tend not to leave fingerprints or other clues to their identity, which means that the chances are very small that you will ever see your valuables again. It may be next to impossible to make your home 100% burglar proof,…

Read More

Warning! USB Drives Could Infect You With Ransomware

Researchers report that the latest Spora ransomware strain, a highly sophisticated version of malware, can now spread itself through USB thumb drives. What’s worse, Spora’s encryption procedures don’t have the usual requirements, such as a Command & Control server, a user-friendly payment site, etc. Like many versions of ransomware, Spora uses a ZIP file that…

Read More