2 Factor Authentication

2-factor authentication is your friend. Use it!
I always tell users to be very certain of any attachments, not only checking who they’re from, but being certain that the person in question intentionally sent them. This e-card greeting spam (Washington Post article) should remind you of another thing: Links in an e-mail don’t necessarily go where the text says they go. Be…
There was a time when cars were few and far between and when car theft was essentially unknown. You could leave your car sitting out in your yard or on the street and generally expect to find it there in the morning. Then the automobile came into its own. Many people owned them, and many…
They’ve laid out the critical data in a post titled Election Hack Report FAQ. This report includes clarifying that, despite their headline, they were not claiming that the report truly traced the hacking to Russia. I thought that was pretty clear in the first place, but I suppose “headline only” readers (not my favorite people),…
I’m writing this article so that I can refer callers to it. It’s going to be very, very basic. I’ve been getting calls from people who have been referred by my clients, generally with serious malware issues on their computers. When I look at the machine I invariably find that there is a fairly simple…
Spoof emails can be convincing if they contain the right information. Further, how do you know whether you have actually been hacked? Here are some tips.
If you’re having problems loading some secure sites using Firefox (for me it’s gmail.com, which is secure!), you might need to check the notes on this page.
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)