We live in a world of constant change. Caught in a fast-paced river of technology, we sometimes fear what the future may bring. We possess knowledge and technological marvels which were inconceivable in our grandparents’ day. While there are dangers to this technology river, some may want to leave the stream. Others may fight against […]
The DHS has issued this bulletin to advise of the heightened cyber threat to computer systems. While cyber-attacks are nothing new, this bulletin warns of a heightened effort for state-sponsored cyber-attacks against the United States.
I have provided a link here for you to quickly check to see what the EOL “End Of Life” is for your version of MS Office. Check your version by clicking here and enter the product i.e. word 2013 Why is this important? Microsoft provides security updates to all its products on Patch Tuesday. Once […]
Below is a link where you can find previous posts of “Patch Tuesday” bulletins. These notifications began in December of 2013 in an effort to advise our clients and friends of things they needed to know as well as warnings, and ways to protect themselves while on the internet. We hope you find them valuable. […]
Patch Tuesday occurs every second Tuesday of the month in North America. Sometimes called “Update Tuesday,” Patch Tuesday is an unofficial term for the day when Microsoft releases update packages for the Windows operating system and other Microsoft software applications, including Microsoft Office. As Microsoft patches security vulnerabilities, it doesn’t release those patches immediately. Instead, […]
Through no fault of your own, your account information, such as email and password(s) could have been exposed during a data breach.
2018 has been called the year of the data breach tsunami. As I mentioned in previous bulletins, data breaches are escalating at an alarming rate. Although the number of breaches decreased from 1597 to 1232 in 2018, the amount of data exposed this past year was massive, in the BILLIONS. Google’s new Chrome extension […]
1 – Researchers have found many cheaper phones already infected with malware before you even get them. This provides a bridge for hackers later on. 2 – To ease drop on your calls. People use their phones to speak to loved ones, discuss business plans, talk about their travels—all manner of personal, intimate content. […]
The following discussion points are more or less things and ways to avoid being taken advantage of while surfing the net. Most of it is simply common-sense ideas and suggestions of which you should be aware or may find worthy enough to remember when you run across something on the internet. These tips are […]