A suspicious email was sent to me today. One that made me look twice. The email looked to be a bounced email. You know, one of those emails that says unknown email address. This one looked very real […]
Several times over this past month I have stressed the importance of using unique and complex passwords. Turning the password into more of a passphrase and making sure they are using upper and lower letters as well as […]
There is some confusion between cybersecurity risks and privacy risks. I am going take a few moments to breakdown the two. Cybersecurity is concerned with the confidentiality, integrity, and availability of data. Where privacy is concerned with the […]
For more information, see the National Institutes for Standards and Technology publication 7621  Creating a Cybersecurity program for a small business is straight forward. There are five functions that every security program must address. The first step in any […]
It is not secure Email has become one of the most prevalent ways we communicate electronically. Hundreds of billion of emails sent every day. And every one of them should not secure. Someone other than the intended recipient […]
Insider Threats This is the last post for this series of the “Top Five Threats All Businesses Face”. Today we exploring insider threats. What is an insider threat? As the name says, the threat comes from inside the […]
Weak Passwords As you may have guessed by now, I am very keen on using strong and unique passwords. Strong and unique passwords for everything. From the critical like bank account and email accounts to the trivial like […]
Ransomeware (Continued) DO NOT PAY THE RANSOM  In today’s post, I am going to go a little deeper with the issue of ransomware. Ransomware is so prevalent that even the FBI ranks ransomware as one of the top scams.  The […]