Testing the Lenovo code

Phishing

16

Jun2017
Ransomware could become a nonissue at a Folsom dental office. Daphne runs a dental office in Folsom. She gets scared every time she learns of ransomware, spyware and malware. "They're all challenging me and my ability to protect our client data. We're not the only dentist office in Folsom," she complains. ... Read More
Cyber Security

15

Jun2017
What Traffic Ticket Phishing looks like. Although this happened in New York, this phishing attack could very easily happen in any state. Online reporter Doug Olenick at SC Media revealed a press release from the NY State Department of Motor Vehicles warning about a phishing scam. The phishing scam targets New ... Read More
Phishing

13

Jun2017
Ransomware could become a nonissue. We survived last month's WannaCry Ransomware attack. WannaCry struck folks who avoided the most recent Microsoft security updates. They also previously clicked a phishing link. WannaCry encrypted files and demanded $300US in BitCoin to make them readable. Proactive users avoided this nonsense. Avoiding WannaCry.... Read More
MCSE-Mobility-B&W

06

Jun2017
Microsoft certified technicians help keep your business in business. As you review candidates to be your outsourced IT support company, ask for those who are Microsoft Certified. Why? Because they make great consultants. They drive fast time-to-value, onboard quickly and responding to challenges confidently.... Read More
Phishing

18

May2017
Wannacry, the worst ransomware in history, is preventable. Last week, the Wannacry ransomware infected 200,000 computers. It started infecting Britain's hospitals. We soon learned it was international. A client asked me about it. How to get infected. Here's what I wrote:... Read More
How_Ransomware_Works

16

May2017
Ransomware strikes British hospitals. Friday's ransomware attack infected computer networks of at least 40 British National Health System hospitals. Administrators suspended non-emergency operations. They also are diverting ambulances. Mikko Hypponen, chief research officer at the ... Read More
Cyber Security

14

May2017
Malware Malware Everywhere. Malware attacks are on the rise. According to Wikipedia, "Malware, short for malicious software, is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display ... Read More
Username-password-phishing-attempt

11

May2017
Yesterday's phishing atack. Yesterday, someone included me in a phishing attack. According to Wikipedia, “phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising ... Read More
Username-password-phishing-attempt

09

May2017
Yesterday's phishing attempt. Yesterday morning, someone sent me a phishing attempt. According to Wikipedia, “phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by ... Read More
Data-Security-Large-Resolution1

07

May2017
BitLocker = ? I am glad you asked. BitLocker is Microsoft's hard drive encrypting tool. You enable it on the hard drives residing in your computer or on external drives you attach with a USB cable. This is included in Microsoft Windows 7 and Windows 10 Professional. There is no cost. I am ... Read More
fusion-cloud-backup

05

May2017
Test your backups. You're running a business. You have mission-critical data on your server and workstations. This includes trade secrets, client data and financial information. You backup your data to protect you in case an emergency struck. You know the backups work and your mission-critical data is safe, offsite. Or do you? This ... Read More
passwords

27

Apr2017
Do you need to find your WIFI password? If I had a dollar for every time someone asked me to find their WIFI password (encryption key) and type it into a new notebook, phone or tablet, I could afford to live in California. OK, OK, OK, I do live in California. Nuf said. This does, ... Read More
April 27, 2017Mark Anthony Germanos
ZIP-Multimedia-Compression

25

Apr2017
ZIP files when you need to keep them together. Windows lets you ZIP files. A ZIP file is a file that contains other files. The ZIPping process also compresses the files it contains. If you want to send four files at 3 MB each, you're looking at 12 MB in sum. Adding ... Read More
April 25, 2017Mark Anthony Germanos
ssd-vs-harddrive

23

Apr2017
Solid State Drives work for you. Solid State Drives are computer hard drives that have no moving parts. Therefore, they make the computer run faster, generate less heat and last longer. How one can help your business.... Read More
April 23, 2017Mark Anthony Germanos
A network support professional will keep your network working while you run your business

20

Apr2017
How can you save money? Maybe I should answer this "how do I save money" question  with a story. My first client was a highly respected professor. He did not practice preventative maintenance and he did not save money in this episode. He bought a new Lexis ... Read More
April 20, 2017Mark Anthony Germanos
WeTransfer

18

Apr2017
Have you ever wanted to send a large file? Today, I will show how to send a large file over the Internet. Files that are less than 10 MB can usually travel as e-mail attachments. If you try sending a large file (larger than 10 MB), you will get...unpredictable results. That's ... Read More
April 18, 2017Mark Anthony Germanos
Username-password-phishing-attempt

16

Apr2017
Watch out for phishing attacks. Yes, you read that right. You have to be street smart and watch for phishing attempts. These are attempts to gain your website credentials at a fake site. They are more common than ever. Perhaps you've seen e-mail asking you to verify your Amazon, PayPal or ... Read More
April 16, 2017Mark Anthony Germanos
A network support professional will keep your network working while you run your business

13

Apr2017
You have secure data. How secure is it? Your workday may be done. However, thousands of people can access your secure data all night long. Outsiders and insiders both are a risk. Some of history's worst attacks were conducted by insiders. To maintain access control and secure your data, you have ... Read More
April 13, 2017Mark Anthony Germanos
Cyber Security

11

Apr2017
Revisit Your cybersecurity resolutions. Yes, yes, yes, I know. It's not January 1st anymore. I agree. Regardless, you should look at your cybersecurity policies and ask if a) they are up to date, and b) if you're meeting them. This includes interviewing your IT department. They may see your ... Read More
April 11, 2017Mark Anthony Germanos
Outsource your network management

09

Apr2017
Network security is an investment. Network security is not cheap. You already knew that. Individual solutions are becoming more costly. Inexpensive open source alternatives struggle to keep up. Compliance and quality assurance costs are rising annually. The total cost of cyber crime is reaching unprecedented levels, averaging $15 Million per year ... Read More
Cyber Security

06

Apr2017
Hackers are targeting you and your data. Hackers attack daily. Most hacker attacks are not news headlines anymore. Hackers continue to gain access to valuable data and personal information daily. They target both private companies and government agencies. The good news is, most companies have begun to take security seriously. Therefore, ... Read More
hurricane-sandy-satellite-7

26

Feb2017
You need a disaster recovery plan. Who wants to incur a fire, flood or theft that knocks you out of business? Nobody. Good. Who has a disaster recovery plan? You would use one to resuscitate your business if a disaster struck. Disasters happen. Airplanes landed in New York City. A hurricane and levee ... Read More
February 26, 2017Mark Anthony Germanos
Failing battery

19

Feb2017
Do not waste money on a replacement battery. Yes. You read that right. I am advocating that you do not replace a failed cell phone battery. A failing battery is the first and usually most visible sign that your phone is failing. You should replace the complete phone. A story for you.... Read More
February 19, 2017Mark Anthony Germanos
1000 feet of Ethernet cable

09

Jan2017
You need to hire professional contractors. You need something done right, on time, the first time. Go shopping. You can find a professional or find someone who says he can do the work and "can give you a discount" before you start talking price. Should you hire him? I would say, no. ... Read More
January 9, 2017Mark Anthony Germanos
internet domain name

30

Dec2016
Manage your Internet Domains before they get hijacked. Last week, a business owner walked up to me and said, “I think I need your help. Someone called me and offered me my Internet domains for $5,000. I am not receiving any e-mail and the web site you visit while trying to ... Read More
December 30, 2016Mark Anthony Germanos
Privacy Policy

02

Nov2016
Do you even have a privacy policy? No policy? While rewriting this website, I reviewed this website’s privacy policy. What? No policy? Seems I wrote and published this website before publishing online privacy policies became commonplace. I published a new one for mine and am encouraging you to write one for ... Read More
November 2, 2016Mark Anthony Germanos
cheap toy

13

Oct2016
Avoid the low bidder. You should avoid the low bidder. They usually cut corners in order to maintain their low pricing. This aggressive corner cutting usually works against you. You get cheaper parts, lower quality workmanship, or both. That’s why I avoid hiring low bidders and so should you. I recently hired ... Read More
October 13, 2016Mark Anthony Germanos
Phishing

02

Sep2016
Phishing…yes or no?   This morning, I received a rather suspicious e-mail allegedly from Amazon.com. This looked like an order confirmation for a TV someone purchased and shipped to Alabama. Upon inspection, I learned this was a phishing attempt. I deleted the fraudulent message. I want to show how to identify a phishing ... Read More
September 2, 2016Mark Anthony Germanos
password1-618×336

11

Aug2016
If you see your password here, you better change it. When we choose passwords, most prefer easy to remember words. We're all guilty of doing that at least once. A client used her husband’s name, a woman who used her favorite baseball team and a man chose“12345” as his standard password. I kid ... Read More
August 11, 2016Mark Anthony Germanos
RFID wallet

13

Jun2016
Reduce interest-based ads’ effectiveness. Anybody out there tired of online ads that pull you away from your work? Same here. Online marketers track your web surfing habits. They then use that information to create interest-based ads they feel will appeal to you. I am showing two ads that appeal to me, ... Read More
passwords

13

May2016
Understanding passwords. The stronger your passwords, the more work an identity thief has to do to break them. A strong password is a password that: Has lowercase letters. Has uppercase letters. Has numbers, and Has special characters. We ... Read More
credit_card

02

May2016
Protect your RFID charge cards. I bought an RFID blocking wallet…and so should you. RFID is an acronym. It stands for radio-frequency identification (RFID), which “uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information,” according to https://en.wikipedia.org/wiki/Radio-frequency_identification. These tags are commonly found ... Read More
dual-monitors

28

Mar2016
Say YES to dual monitors. I recently told a client that she should have dual monitors at her desk. She replied, “I’ve been using only one for decades. Why do I need two now?” Here are some reasons: 1. Dual monitors present a larger, crisper image that spans across two devices. 2. Dual ... Read More
March 28, 2016Mark Anthony Germanos

http://www.dictionary.com/browse/cybersecurity




Example Page