2 Factor Authentication

2-factor authentication is your friend. Use it!

The full description is at Red Tape Chronicles. Spammers are using Google search links in e-mails to get people to their sites. As usual the solution is not clicking on things if you don’t know what they are. Consider it first. Also, as usual, look at the bottom bar of your browser with the mouse…
Whether or not you use gmail, you should read this. The article is from Wordfence, which primarily does WordPress security, but they have previously published excellent work on other attacks, and every word of their advice is good. In particular, the advice to carefully read your address bar to make sure you are where you…
I’m writing this article so that I can refer callers to it. It’s going to be very, very basic. I’ve been getting calls from people who have been referred by my clients, generally with serious malware issues on their computers. When I look at the machine I invariably find that there is a fairly simple…
SmartPlanet has a list of the 25 worst passwords of 2011. It’s good to read the comments as well. Computer people tend to make the error of thinking that any password that’s hard to guess is good, and the harder the better. But the fact is that people tend to write down passwords that are…
Smishing is sending a faked text to your phone in an attempt to gain personal information. This personal information can be used to gain access to other accounts. Here’s a link with more information. It’s targeted at me, as a service provider, but it provides you with information you need as well.
I was reading this article from TechRepublic today and at first I thought it had little to do with me, because I manage such small networks. But it wasn’t many paragraphs until it was ringing too true to me to ignore. It matches my experience. Now the largest network I manage has 12 pieces of…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)