Spybot Evalutation
Here’s an evaluation of Spybot Search and Destroy. I’ve also found the tool useful, but not as one’s sole protection.
Here’s an evaluation of Spybot Search and Destroy. I’ve also found the tool useful, but not as one’s sole protection.
Multiple recent incidents of clients having difficulties with email attachments have set me to calling people to remind them of good security practices with email. You don’t have to be a victim. Dealing correctly with attachments to emails is extremely important because it has become one of the primary vectors for attacking your machine. The…
I found this article on the Imunify360 blog well worth the time.
An answer to the question: Do You Need a WordPress Security Plugin? The explanation is also useful in helping those who aren’t experts understand why computer security must be regularly updated.
If you’re not subscribed to various useful blogs on TechRepublic, you should be. I get a great deal of information from that source. For those who may not be subscribed, or who haven’t seen it yet, let me recommend Video: Three ways you might be breaking the law with your computer (there’s also a text…
Barracuda, whose software I use for the IT side of my business provides a checklist for response to ransomware attacks. This checklist is aimed at managed service providers, which is what I have done since 1995, though I’m slowing down now. I had two clients in that time hit by ransomware attacks. Both recovered, primarily…
A number of people have wound up calling me to help them recover their computers when the problem was simply that some website had been given permission to send notifications. When browsing, be very careful. The more popular the category in which you’re searching, the more likely there are bad websites pretending to serve your…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)