Link: Securing a Linux Server
This article gives key elements. I also recommend using additional AV software, especially if you are hosting WordPress or other CMS accounts. Imunify360 is a good option.
This article gives key elements. I also recommend using additional AV software, especially if you are hosting WordPress or other CMS accounts. Imunify360 is a good option.
Many people have the impression that most computer hacking is the result of superior technical abilities, which, despite your best efforts, let’s an attacker get control of your computer or other device electronic device. It’s true that hacking involves technical skills, but a great deal of it involves simple people skills, knowledge of how people…
If you don’t have automatic updates on your computer, you need to check this: Massive Global Ransomware Attack Underway, Patch Available. This is from the folks at Wordfence, who, in my experience, have been right on the money multiple times. If you don’t have automatic updates set, update your computer immediately and make sure to…
I’m actually announcing this somewhat late, but I am now an Avast Premier Partner, indicating that I have taken training in both sales and technical aspects of their software. I build my support for small businesses around their Managed Workplace and Cloudcare solutions, and use their end point security software. Considering that all my customers…
Spoof emails can be convincing if they contain the right information. Further, how do you know whether you have actually been hacked? Here are some tips.
A number of people have wound up calling me to help them recover their computers when the problem was simply that some website had been given permission to send notifications. When browsing, be very careful. The more popular the category in which you’re searching, the more likely there are bad websites pretending to serve your…
The hope of getting something for nothing was encouraged with the advent of computers and software. For technically oriented people, it’s fairly easy, and relatively safe, to steal software. You just copy it. For many, especially in the early days, this didn’t seem like stealing. After all, where is the thing that you’re stealing? I…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)