Tech 4 Every 1

By Asset Business Computing | What every small business MUST know about technology.

21 Interesting Cyber Security Statistics (2017-2018)

Cyber attacks are growing in prominence every day – from influencing major elections to crippling businesses overnight, the role cyber warfare plays …

Cybersecurity

5 Steps Employees Can Take to Prevent Cyberattacks

Cyber-attacks

Atlanta's Reported Ransomware Bill: Up to $17 Million

<b>City Didn't Pay Ransom, But Spends for Cleanup, New Devices, Better Security</b><br>The cost of the city of Atlanta's mitigation and subsequent IT overhaul …

Cybersecurity

The Sale of Hacked Credit Card Info on the Web Is Surging

July 13, 2018 by Yalman Onaran<p>The number of hacked U.S. credit cards whose information was offered for sale to other criminals on the Dark Web jumped …

Credit Cards

What is a zero-day exploit? A powerful but fragile weapon

A zero-day is a security flaw that has not yet been patched by the vendor and can be exploited and turned into a powerful but fragile weapon. …

Cyber-attacks

Bad .Men at .Work. Please Don’t .Click

Web site names ending in new top-level domains (TLDs) like <b>.men</b>, <b>.work</b> and <b>.click</b> are some of the riskiest and spammy-est on the Internet, according to …

Police Dept Loses 10 Months of Work to Ransomware. Gets Infected a Second Time!

Bleepingcomputer reported: "Ransomware has infected the servers of the Riverside Fire and Police department for the second time in a month.The first …

City of Atlanta IT Systems Shut Down by SamSam Ransomware. Demand Is $51K To Decrypt

It was all over the major press yesterday. The Mayor of Atlanta, Georgia has confirmed that several local government systems are currently down due …

Patches Pitched to Address Cyber Hacking Risks Created by Intel Chip Flaws

January 5, 2018 by Kanishka Singh and Douglas Busvine<p>Security issues with Intel Corp microchips are only slowing computers slightly, technology …

IoT - "Internet of Things" Basics for Small Business

OK. You've heard the term IoT or Internet of Things. First, what the heck is that? And second, why do you care?<br>This is yet another example of …

Internet of Things

Dear Aunt Sadie, Please Step Back From The Net Neutrality Ledge

In the 25 years I’ve been toiling in the mines of tech policy, I’ve developed what I call the Aunt Sadie test. Most of the issues I research and write about are woefully technical, legal, economic and boring; of interest to more and more people here in Silicon Valley as the information economy …

Webroot's Top 10 Nastiest Ransomware Attacks of 2017 | Webroot

DESCRIPTION<p>Starting as a fake Ukrainian tax software update, this ransomware is a variant of an older attack dubbed Petya, except this version uses …

United Kingdom

Questions You Need to Ask About Your Cloud Storage and Backups

"The Cloud" is a wonderful concept. You buy technology services as needed and they promise essentially zero downtime. Unfortunately, you have to be a …

Is Your Mobile Carrier Your Weakest Link?

More online services than ever now offer two-step authentication — requiring customers to complete a login using their phone or other mobile device …

Information Systems

More than a million Gmail and Yahoo account credentials on sale

Security Editor<p>Follow:<p>Login credentials and other personal information linked to more than a million Gmail and Yahoo accounts is reportedly being …

Online Life

Ticking time bombs: 6 essential services that still depend on legacy systems

Datil<p>OP<p>this is a little scary. but you also have to remember that most of these systems have little to no connection to any internet resources. and …

17 Safe Internet Browsing Tips for Beginners

The Internet can be a dangerous place for the careless. Land on the wrong website, and you can infect your computer with malicious software that will …

U.S. Businesses Say They're Ready for Cyber Attacks; Employees Have Different Answer

U.S. Businesses Say They’re Ready for Cyber Attacks; Employees Have Different Answer<p>June 6, 2017<p>U.S. employees remain unprepared for cybersecurity …

No Monday Morning Reprieve for Cyber Attack Victims

May 14, 2017 by Jordan Robertson and Rebecca Penty<p>An unrivaled global cyber-attack is poised to continue claiming victims Monday as people return to …

Cybersecurity

Ransomware Attacks Quadrupled in 2016; They'll Double in 2017: Beazley

Ransomware Attacks Quadrupled in 2016; They’ll Double in 2017: Beazley<p>February 3, 2017<p>Specialty insurer Beazley, which offers data breach response …

Cybersecurity

Reusing Passwords Will Kill Your Business

Do you reuse passwords? If so, it's just a matter of time before the bad guys break into your network, your laptop, your bank account, and your …

Information Systems

The FTC’s Internet of Things (IoT) Challenge

One of the biggest cybersecurity stories of 2016 was the surge in online attacks caused by poorly-secured “<b>Internet of Things</b>” (IoT) devices such as …

Internet of Things

Cyber Criminals now spreading ransomware through Facebook, LinkedIn

If you find a graphic or image on your computer and you don’t remember downloading it, stop before opening! Experts have seen a dramatic increase in …

776,000 patient health records breached in October

The number of patient health information breaches was down again in October for the second month in a row, but swaths of patient data have been …

FTC lays down the ransomware law

The chair of the Federal Trade Commission (FTC) is advising businesses that the FTC might hold them accountable for not fixing vulnerabilities …

Ransomware

Hacking Your Phone

The Three Biggest Mistakes Non-IT People Make When They Plug Things In

This might sound silly at first, but it's not. If you're not an IT Professional, you may be plugging some things in wrong - costing yourself …

Raspberry Pi

Flaws in wireless keyboards let hackers snoop on everything you type

Many popular, low-cost wireless keyboards don't encrypt keystrokes.<p>Your wireless keyboard is giving up your secrets -- literally.<p>With an antenna and …