Info on Rootkits
TechRepublic’s 10 Things blog has a pretty good rundown. I’ve recently had to explain the very basics of rootkits to an occasional curious customer.
TechRepublic’s 10 Things blog has a pretty good rundown. I’ve recently had to explain the very basics of rootkits to an occasional curious customer.
You can guess how I feel about this one as I provided a quote. Barracuda Content Shield provides off-site checking of content, while Managed Workplace is the core of my services to small offices. If you’re one of my clients, you’re already benefitting from this to some extent. If you’re one of those who have…
I was reading this article from TechRepublic today and at first I thought it had little to do with me, because I manage such small networks. But it wasn’t many paragraphs until it was ringing too true to me to ignore. It matches my experience. Now the largest network I manage has 12 pieces of…
If you’re not subscribed to various useful blogs on TechRepublic, you should be. I get a great deal of information from that source. For those who may not be subscribed, or who haven’t seen it yet, let me recommend Video: Three ways you might be breaking the law with your computer (there’s also a text…
There’s a new version of a common scam, one in which someone claims to be customer support for a major company. In this case, the ad falsely purports to be from Amazon and leads to a fake infection warning which claims to be from Windows Defender, and provides a phone number you can call for…
Computers users have gotten used to using user names, passwords, and pins to secure their data. They may not be thinking of it in terms like “securing my data,” but they don’t want snoopy people in their phones, tablets, or computers. Unfortunately, many people have passwords or pins that may be easily guessed.
Wordfence has an excellent post on this subject. While their post is aimed at WordPress users, the ideas are good for any password. My own comment is this: Use MFA – multi-factor authentication. This is accomplished in various ways, such as an app on your phone, a texted code, emailed code, and so forth. It takes…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)