Link: Securing a Linux Server
This article gives key elements. I also recommend using additional AV software, especially if you are hosting WordPress or other CMS accounts. Imunify360 is a good option.
This article gives key elements. I also recommend using additional AV software, especially if you are hosting WordPress or other CMS accounts. Imunify360 is a good option.
I have been testing Wordfence as my primary security for WordPress sites, and I have been getting more positive about it as I go along. I will almost certainly use the free version on my more minor sites and probably the Pro version on a couple of major ones. In any case, what they do…
Smishing is sending a faked text to your phone in an attempt to gain personal information. This personal information can be used to gain access to other accounts. Here’s a link with more information. It’s targeted at me, as a service provider, but it provides you with information you need as well.
I’m actually announcing this somewhat late, but I am now an Avast Premier Partner, indicating that I have taken training in both sales and technical aspects of their software. I build my support for small businesses around their Managed Workplace and Cloudcare solutions, and use their end point security software. Considering that all my customers…
I’m writing this article so that I can refer callers to it. It’s going to be very, very basic. I’ve been getting calls from people who have been referred by my clients, generally with serious malware issues on their computers. When I look at the machine I invariably find that there is a fairly simple…
From the SmarterMSP.com blog – Threat Spotlight: Phishing emails using Adobe InDesign on the rise. I use InDesign for book layouts and cover designs, and others may use it for similar graphics needs. Always be on the lookout for these kinds of emails. They may exploit a variety of software.
You will find more infographics at Statista I would recommend reading the article for more information. Users should note that the primary vector for infection is an infected email. Do not follow a link from an email or download an attachment unless you know who sent it, trust them completely, and are confident of the…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)