Post info:

Infotech Solutions – Managed Services

Did you know Infotech provides Managed Firewall plans for small to medium sized business? If you are unsure of your current security posture contact Infotech for a free assessment today! Do you already have IT? We have plans for that too. We can assist your already overloaded IT with easy remote access, patch management, anti-virus management, asset & software reporting, as well as scripting. We also provide cyber security packages and guidance to assist with ransomware prevention and lock down.

Read the full post

Post info:

Lock your Computer

  Many times people are worried about people hacking into their computer and stealing their information. Some instances the computer is simply left unattended. Whenever you are not at your computer, you should always sign out before you leave or lock the workstation. To execute this, one would typically go to the start menu, power settings, then sleep. That sequence will log you off of the PC. Rather than going through all of those clicks, simply hold the Windows button

Read the full post

Post info:

Has your email address been compromised?

You can check to see if your email address has been compromised by some of the data breaches. Simply go to haveibeenpwned.com and enter your email address. Once you enter your questioned email, you will either get good news that it hasn’t been part of any breaches…yet, or it will let you know what breach your information was a part of. In the event your email was a part of the data that was breached, it doesn’t mean the bad

Read the full post

Post info:

Information Leak: LifeLock

It seems a flaw within LifeLock’s website may have exposed all of the emails of their subscribers. While the exposure of email without any other information like passwords or personal information seems harmless in itself, it now brings the substantial threat of spear phishing attacks. “If I were a bad guy, I would definitely target your customers with a phishing attack because I know two things about them,” Reese said. “That they’re a LifeLock customer and that I have those

Read the full post

Post info:

Email SpearPhishing/Extortion

We have noticed a new phishing scam come through. However, this scam involves a portion of the user’s credentials (username and/or password). Below is an example of the text in the body of the email. The email address and known password have been redacted. “Lets get directly to point. Not one person has compensated me to check about you. You may not know me and you are most likely wondering why you are getting this e-mail? actually, I actually placed

Read the full post

Post info:

Notification Law

The new South Dakota Breach Notification Law was enacted on July 1, 2018. While the organizations throughout the state are learning more about the rules, wording, & procedures as the days go by, a North Carolina federal court decision has made a ruling that could impact the rest of the nation.  “According to a recent federal court decision, an employee who is tricked into sharing personal information in response to a phishing email can be seen as committing an intentional disclosure under

Read the full post

Post info:

Do you own an Amazon Fire TV or Stick?

There are a TON of apps/programs that offer some sort of “free” content that we download on our computer and phones. With that “free” content, you may be getting more than you initially thought. You may also be downloading viruses & malware. Amazon Fire TV & Fire Stick are now also at risk of downloading content that could infect other Android decics that are connected as well. If you are using the Fire TV & Stick, in accordance with the

Read the full post

Post info:

BREACH: MyHeritage

MyHeritage, a genealogy & DNA testing company, disclosed that they have leaked 92 million users email addresses and their hashed passwords. While they don’t have the users actual password since it’s hashed, they have the chance to try to “crack the code” and reveal the true passwords. This sets up an opportunity for the bad guys to create a phishing scheme and send a malicious email to 92 million users trying to have them “update” their information, or try to

Read the full post

Post info:

Mobile Security

We tend to place a lot of emphasis in securing our place of employment by monitoring workstations & servers. As each day goes by, we are relying more and more on our mobile devices due to continuous connectivity & ease. We need to spend some time making sure our mobile devices are secure as well. Here are a few tips: Only install apps from a trusted source Avoid transmitting or storing personal information on the device Lock your device with

Read the full post

Post info:

TWITTER

Recently, Twitter asked all 300+ million users to reset their passwords. The reason for this is because they found a bug that was storing the passwords in plain text rather than through the encryption protocols. If you do have Twitter, I strongly urge you to go change your password now. Full article here.

Read the full post

Posts navigation