Asset Business Computing

103 Added | 4 Magazines | 1 Follower | @AssetBC | Keep up with Asset Business Computing on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Asset Business Computing”

City of Atlanta IT Systems Shut Down by SamSam Ransomware. Demand Is $51K To Decrypt

It was all over the major press yesterday. The Mayor of Atlanta, Georgia has confirmed that several local government systems are currently down due …

City Politics

Patches Pitched to Address Cyber Hacking Risks Created by Intel Chip Flaws

January 5, 2018 by Kanishka Singh and Douglas Busvine<p>Security issues with Intel Corp microchips are only slowing computers slightly, technology …

Information Security

IoT - "Internet of Things" Basics for Small Business

OK. You've heard the term IoT or Internet of Things. First, what the heck is that? And second, why do you care?<br>This is yet another example of …

Internet of Things

Dear Aunt Sadie, Please Step Back From The Net Neutrality Ledge

In the 25 years I’ve been toiling in the mines of tech policy, I’ve developed what I call the Aunt Sadie test. Most of the issues I research and write about are woefully technical, legal, economic and boring; of interest to more and more people here in Silicon Valley as the information economy …

Net Neutrality

Webroot's Top 10 Nastiest Ransomware Attacks of 2017 | Webroot

DESCRIPTION<p>Starting as a fake Ukrainian tax software update, this ransomware is a variant of an older attack dubbed Petya, except this version uses …

Questions You Need to Ask About Your Cloud Storage and Backups

"The Cloud" is a wonderful concept. You buy technology services as needed and they promise essentially zero downtime. Unfortunately, you have to be a …

Cloud Computing

Is Your Mobile Carrier Your Weakest Link?

More online services than ever now offer two-step authentication — requiring customers to complete a login using their phone or other mobile device …

Information Systems

More than a million Gmail and Yahoo account credentials on sale

Login credentials and other personal information linked to more than a million Gmail and Yahoo accounts is reportedly being offered for sale in a …

Cybersecurity

Ticking time bombs: 6 essential services that still depend on legacy systems

Datil<p>OP<p>this is a little scary. but you also have to remember that most of these systems have little to no connection to any internet resources. and …

17 Safe Internet Browsing Tips for Beginners

The Internet can be a dangerous place for the careless. Land on the wrong website, and you can infect your computer with malicious software that will …

Information Systems

No Monday Morning Reprieve for Cyber Attack Victims

May 14, 2017 by Jordan Robertson and Rebecca Penty<p>An unrivaled global cyber-attack is poised to continue claiming victims Monday as people return to …

U.S. Businesses Say They're Ready for Cyber Attacks; Employees Have Different Answer

U.S. Businesses Say They’re Ready for Cyber Attacks; Employees Have Different Answer<p>June 6, 2017<p>U.S. employees remain unprepared for cybersecurity …

Reusing Passwords Will Kill Your Business

Do you reuse passwords? If so, it's just a matter of time before the bad guys break into your network, your laptop, your bank account, and your …

Information Systems

Cyber Criminals now spreading ransomware through Facebook, LinkedIn

If you find a graphic or image on your computer and you don’t remember downloading it, stop before opening! Experts have seen a dramatic increase in …

Malware

The FTC’s Internet of Things (IoT) Challenge

One of the biggest cybersecurity stories of 2016 was the surge in online attacks caused by poorly-secured “<b>Internet of Things</b>” (IoT) devices such as …

Internet of Things

Ransomware Attacks Quadrupled in 2016; They'll Double in 2017: Beazley

Ransomware Attacks Quadrupled in 2016; They’ll Double in 2017: Beazley<p>February 3, 2017<p>Specialty insurer Beazley, which offers data breach response …

776,000 patient health records breached in October

The number of patient health information breaches was down again in October for the second month in a row, but swaths of patient data have been …

FTC lays down the ransomware law

The chair of the Federal Trade Commission (FTC) is advising businesses that the FTC might hold them accountable for not fixing vulnerabilities …

Cybersecurity

47 no-fail ways to come up with blog ideas

Empty Google docs. Empty editorial calendars. Empty WordPress posts.<p>Sometimes content marketers have to deal with a lot of emptiness, and turn all that blank space into content that attracts, and engages, and converts.<p>But no pressure, right?<p>How do you keep the ideas and creativity flowing …

Hacking Your Phone

The Three Biggest Mistakes Non-IT People Make When They Plug Things In

This might sound silly at first, but it's not. If you're not an IT Professional, you may be plugging some things in wrong - costing yourself …

Photoshop

Flaws in wireless keyboards let hackers snoop on everything you type

Many popular, low-cost wireless keyboards don't encrypt keystrokes.<p>Your wireless keyboard is giving up your secrets -- literally.<p>With an antenna and …

Information Security

DropBox is Not Your Friend

Let me start out by saying that DropBox CAN be the perfect solution for many small businesses - IF it's the solution to the right problem!<br>There's an …

Encryption

How Not To Have A Sucky Password: The Secret

How Not To Have A Sucky Password<p>Yeah, yeah, yeah…I know. I just got through writing a blog post HERE saying your password needed to die. Knowing that …

Hackers stole $80 million from a central bank because it had $10 routers and no firewall

The shortcomings made it easier for hackers to break into the system earlier this year and attempt to siphon off nearly $1 billion using the bank's SWIFT credentials, said Mohammad Shah Alam, head of the Forensic Training Institute of the Bangladesh police's criminal investigation department.<p>"It …

Central Banks

Tick, tock: Jigsaw ransomware deletes your files as you wait

Victims of the new ransomware strain will see their files vanish before their eyes if they don't pay up.<p>A new breed of ransomware has ramped up the …

Ransomware

7 Management Hacks Worthy of Tacking on Your Wall

The next time you're under the gun and feel like your head is about to explode, pull these 7 hacks out of your little bag of management tricks and get things back on track.<p>It's easy to become overwhelmed when time is tight and the pressure is on. Use these 7 management hacks the next time you sense …

Productivity

18 Tips to Create Your Perfect LinkedIn Profile (Infographic)

Assistant Editor, Contributed Content<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>These days, it takes more than a resume to stand out in a competitive job market. A profile that grabs attention on professional network site LinkedIn could make a difference.<p>One way to attract …

Infographics

10 Things You Should Know About Cybersecurity

March may be known for basketball and St. Patrick's Day, but in the IT community March is all about cybersecurity awareness. To celebrate, we chose …

“Locky” ransomware – what you need to know

<i>Thanks to the Emerging Threats Team at SophosLabs for their behind-the-scenes work on this article.</i><p>“Locky” feels like quite a cheery-sounding …

Microsoft Office