From BarracudaMSP: 5 Security Tips
I got these in the mail today, the day after Christmas, but they’re good for continuing visits, and they’re good year-round.
I got these in the mail today, the day after Christmas, but they’re good for continuing visits, and they’re good year-round.
I always tell users to be very certain of any attachments, not only checking who they’re from, but being certain that the person in question intentionally sent them. This e-card greeting spam (Washington Post article) should remind you of another thing: Links in an e-mail don’t necessarily go where the text says they go. Be…
TechRepublic’s 10 Things blog has a pretty good rundown. I’ve recently had to explain the very basics of rootkits to an occasional curious customer.
Many people have the impression that most computer hacking is the result of superior technical abilities, which, despite your best efforts, let’s an attacker get control of your computer or other device electronic device. It’s true that hacking involves technical skills, but a great deal of it involves simple people skills, knowledge of how people…
Jason Hiner thinks not. The problem is likely less that Vista is bad, than that it is new and different and just a little clumsy for people who are accustomed to Windows XP. The idea of resolving security issues by forcing people to respond to the computer more often may be necessary–I don’t really know–but…
This article gives key elements. I also recommend using additional AV software, especially if you are hosting WordPress or other CMS accounts. Imunify360 is a good option.
I’m going to link to a post from SmarterMSP.com, but I want to summarize here. Most of my clients won’t benefit that much from the linked article. They need to follow my much simpler rule set: This is only going to get worse. AI allows even people who are not very clever to create clever…
(Note: Page author Henry Neufeld is compensated for sales made through links on this page.)