2 Factor Authentication

2-factor authentication is your friend. Use it!

Wordfence Lists Top Security Analysis Tools, and it is generally worthwhile to read their material.
Multiple recent incidents of clients having difficulties with email attachments have set me to calling people to remind them of good security practices with email. You don’t have to be a victim. Dealing correctly with attachments to emails is extremely important because it has become one of the primary vectors for attacking your machine. The…
Due to a remote execution flaw in CyberPanel, I had to clean up after this attack. The most useful site I found was Kinsing malware (kdevtmpfsi) – how to kill on CreateIt. The instructions there are useful. Don’t forget to do the full search, as if you have any “kinsing” files left, they’ll get things started…
I’m actually announcing this somewhat late, but I am now an Avast Premier Partner, indicating that I have taken training in both sales and technical aspects of their software. I build my support for small businesses around their Managed Workplace and Cloudcare solutions, and use their end point security software. Considering that all my customers…
“Turned” nasty? I think hacking is nasty in general. It has been hard to change people’s attitudes toward hackers and copyright violators, because the damage is generally not physical. But the fact is that hackers and spammers cost businesses money. These activities are not some sort of harmless joke–they do damage. Anyone who works in…
There’s a new version of a common scam, one in which someone claims to be customer support for a major company. In this case, the ad falsely purports to be from Amazon and leads to a fake infection warning which claims to be from Windows Defender, and provides a phone number you can call for…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)