Link: Securing a Linux Server
This article gives key elements. I also recommend using additional AV software, especially if you are hosting WordPress or other CMS accounts. Imunify360 is a good option.
This article gives key elements. I also recommend using additional AV software, especially if you are hosting WordPress or other CMS accounts. Imunify360 is a good option.
How to beat ransomware: prevent, don’t react, from MalwarebytesLabs. The one thing I would add to this article is further emphasis on backup. I can’t emphasize it enough. No matter how attentive you are, you cannot absolutely be certain that you won’t get hit by ransomware. You can be careful, but most people use their…
Details come from @BarracudaMSP (advisory). The key element is to carefully check incoming email, and never open an attachment if you have any uncertainty about its origin. Good security software is very helpful, but cannot save you from everything, especially if you execute it yourself. For my clients, let me note that you have the…
If you don’t have automatic updates on your computer, you need to check this: Massive Global Ransomware Attack Underway, Patch Available. This is from the folks at Wordfence, who, in my experience, have been right on the money multiple times. If you don’t have automatic updates set, update your computer immediately and make sure to…
I normally assume my Windows updates will occur with a minimum of fuss and bother, and in fact it took me several rounds to even realize what was going on this morning. I kept getting an “updates ready to install” notice, and I kept telling it to install. I was too busy with morning activities…
Many people have the impression that most computer hacking is the result of superior technical abilities, which, despite your best efforts, let’s an attacker get control of your computer or other device electronic device. It’s true that hacking involves technical skills, but a great deal of it involves simple people skills, knowledge of how people…
I’m frequently asked how to do this, and the simple answer is that if an e-mail isn’t from someone you know or someone you do business with, don’t open it. Further, if the e-mail doesn’t seem in character for that person or business, don’t open it. If you’d be suspicious of the content if your…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)