Security Topics Important Service Functionality End Dates for Microsoft Products You Need to Know While hardware typically alerts users of an impending end date by beginning to fail, having slower response times, or crashing altogether, software applications often provide far less noticeable changes. However, software changes can be just as important as hardware changes and being aware of these can have a big impact
Security Topics The One Thing Most People Don't Know About Keychain - Apple's Password Service If you have ever used an iPhone you know there are lots of places that passwords can be stored. For example, for email accounts, apps, wireless networks, and more. This is most noticeable when you switch to a new phone, especially if you do not restore an encrypted backup onto
Organizational Tips 3 Important Steps to Take Before Laying off Employees In light of all of recent news about employee cutbacks, it is important to keep in mind what steps a business should take before letting employees go. Additionally, if you are an employee these are things you should expect, and can rest assured these steps are not personal. The items
Security Topics New Security Threat: 3CX Phone App for Desktop Computers Unfortunately, as we often state in security posts, new threats are always being released and this week was no exception. Another important security vulnerability has been identified and it could pose a serious risk to businesses and their employees. This week's threat comes in the form of a locally installed
Security Topics 0-Day Security Threat: Mobile Devices using Samsung Modem Chips New vulnerabilities are consistently being found in both newer tech devices and applications, as well as devices and applications that have been around for years. Vulnerabilities can be found in software after changes are implemented or through complementary hardware running the application. Additionally, older applications that are no longer supported
Security Topics Security Update: New Threat Spreads via User's Email Accounts There has been a large increase recently in the number of user's email accounts being compromised. With each account that is accessed by an unauthorized user, this threat continues to spread by reaching out to that user's contacts. This post discusses this recent security threat, what to look for to
Security Topics Security Alerts: Meta, Mastodon and Windows 8.1 Finally Retiring Tis the season for...increased security risks. Not exactly how the saying goes, but unfortunately, this time of year the threats to data privacy and security can be increasingly dangerous. There are several reasons this happens, for example, we usually purchase more - both online and in-store, we are typically
Organizational Tips How to Quickly Remove 3 Types of Autofill Items that are Incorrect Autofill can be a wonderful feature that saves time and allows us to let go of certain details - like someone's email address or a specific website address, etc. Unfortunately, if you ever misspell one of these, autofill can work against you by pulling up the wrong information because this
Security Topics Security Alerts: Twitter, Student Loan Forgiveness & Safer Web Browsing With the end of the year holidays quickly approaching, now is a great time to remember how important it is to be hyper-vigilant about the websites you visit, the emails you open, the links you click and the attachments you open. The reason this is especially true at this time
Security Topics Uber Breach - Why Even Multi-Factor Cannot Protect Against Every Threat Adding multi-factor authentication (MFA) is an additional security step users can take to help protect their accounts from unauthorized access. MFA can be accomplished in several ways. It may require a code sent in email, text, or provided via an authenticator app. In a recent post we discussed the different
Security Topics 3 Steps to Take to Recover an Email You Think has Been Hacked Thinking an email account has been hacked is very stressful. Email is often our most common communication with others, and someone else gaining access to an email account can have serious repercussions. This situation is made more stressful when you are not sure where to begin to regain control of
Security Topics Security Updates: Infected Android Apps, Twitter Vulnerabilities and GPS Trackers Each week there are more data vulnerabilities and attacks released into the wild, exposed by cybersecurity analysts and patched by app developers. The last few weeks have been no exception to this unfortunate reality. This post discusses several recent threats including infected Android apps removed from the Google Play store,
Security Topics Security Updates: A Microsoft Office 365 Flaw and the End of Internet Explorer Updates to software applications are continually being released by their publishers. Sometimes updates are released to address security issues, sometimes they introduce new features, while other times they retire features. Regardless of the reason for these changes, users can only avoid updates for so long. Eventually you will want to
Security Topics Security Round Up: 21M Records Exposed, a SonicWall Vulnerability & Windows Malware As with every month, there have been several new threats to our data and privacy. Most recently, there was a data dump that included personal information on 21 million people, a vulnerability in some SonicWall firewalls, and malware directed at Windows systems. This post discusses what happened, what you need
Security Topics How to Manage Permissions on Shared OneDrive Folders OneDrive is a file syncing tool used to store files in the cloud or as a hybrid of in the cloud and locally. The OneDrive app is included with most Microsoft Office subscriptions, both O365 and Microsoft 365, and includes 1TB of storage. OneDrive shows up as a folder in
Security Topics Security Round Up: Fake Antivirus in Google Play Store and T-Mobile Data Buyback Like most weeks, there have been new security breaches and other issues affecting both businesses and individuals. Two that affect the greatest number of users include a fake anti-virus app in the Google Play Store and T-Mobile trying to buy back their customer data that had previously been breached. This
Security Topics The Most Secure of 3 Forms of Two/Multi-Factor Authentication (MFA) Multi-factor, or two-factor, authentication is a security feature that helps protect users' accounts by requiring extra input when a user attempts to log into one of their accounts. Multi-factor authentication (MFA) is allowed by the provider of the account, and there are different forms of MFA. Multi-factor authentication occurs after
Security Topics Security Round Up: A Windows Data Wiping Bug and Recent Malware Attacks As there always are, new security breaches and updates have been in recent news. While it would be nearly impossible to cover everything, we specifically pick those stories that we think affect the most individuals. As such, this post discusses an important Windows data wiping bug as well as the
General Topics Security Round Up: Google Doc and WordPress Vulnerabilities Plus Malicious USB Drives Several new security vulnerabilities and threats have been exposed over the last few weeks. It is impossible to cover all of the threats, and many affect only a very small portion of the population. Here we cover more commonly used software and applications that are likely to affect greater numbers
Security Topics 3 Security Updates: Exposed User Records, Ransomware and Video Links Spreading Malware Several new security threats have recently been exposed, many of which more directly affect the business word. However, the more aware you are of what is going on, the more likely you are to protect your data security. Also, individuals are also often targets so understanding how current threats work
Security Topics How to Identify Text Messages that are Really SPAM Everyone who has a cell phone has likely been the recipient of SPAM text messages which have recently become more common. These messages are being added to the already sometimes overwhelming number of SPAM emails and calls people deal with on a daily basis. Like SPAM calls and emails, there
Security Topics How to Fix Failing User Credentials on Domain-Joined Devices Connecting via VPNs When a great deal of people shifted to working remotely rather than going into an office, the one thing they were often missing was access to the files they used to be able to easily access. These files were often stored on servers or other computers, rather than on the
Security Topics Security Updates: Clubhouse/Facebook Breach and the Likeliest Malware Threat Source New security threats are introduced, found and patched nearly every day, not all in the same day of course! Some threats are directed at you as an individual, while others are directed at companies you and others do business with. The larger the company, as well as the greater the
Security Topics How to Verify & Update your WordPress Version with Recent Security Threats A new WordPress update recently released addresses three critical security threats as well as providing fixes to 60 bugs. WordPress has urged all users to update their software version to WordPress 5.8.1 [https://eyonic.com/1/?QA] as soon as possible to address these issues. Depending upon the
Security Topics 3 Tech Situations Where it is Dangerous Not to Have Multiple Accounts/Versions Most of the time the advice coming from those who work in technology or security will tell you not to ever share passwords, user accounts, or devices, as well as not to reuse credentials or use easy passwords. These are some of the basics of protecting your personal identity and