2 Factor Authentication

2-factor authentication is your friend. Use it!
A number of people have wound up calling me to help them recover their computers when the problem was simply that some website had been given permission to send notifications. When browsing, be very careful. The more popular the category in which you’re searching, the more likely there are bad websites pretending to serve your…
To maintain information you need to regularly remind yourself and your employees to be attentive in their use of tools. We learn to follow certain safety rules with power tools, but often we forget to be similarly attentive with the devices that store and (hopefully) protect our information Some (but by no means all) things…
“I really don’t pay much attention to security,” the potential client told me. “I don’t have anything on my computer that anyone would want to steal.” There was a time when that would have been an almost valid idea. If you didn’t do your finances on your computer and you didn’t keep personal information there,…
I’m actually announcing this somewhat late, but I am now an Avast Premier Partner, indicating that I have taken training in both sales and technical aspects of their software. I build my support for small businesses around their Managed Workplace and Cloudcare solutions, and use their end point security software. Considering that all my customers…
In a number of webinars I’ve attended this year on information security, I have been alerted to the changes AI is making to email scams. Background Email is the most effect tool for attack that hackers have, because if an email looks like it is from a particular company or from someone known to the…
From the SmarterMSP.com blog – Threat Spotlight: Phishing emails using Adobe InDesign on the rise. I use InDesign for book layouts and cover designs, and others may use it for similar graphics needs. Always be on the lookout for these kinds of emails. They may exploit a variety of software.
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)