Tech 4 Every 1

By Asset Business Computing | What every small business MUST know about technology.

More than a million Gmail and Yahoo account credentials on sale

Login credentials and other personal information linked to more than a million Gmail and Yahoo accounts is reportedly being offered for sale in a …

Ticking time bombs: 6 essential services that still depend on legacy systems

Thai Pepper<p>OP<p>this is a little scary. but you also have to remember that most of these systems have little to no connection to any internet resources. …

Public Wi-Fi: How to Secure Your Data in 10 Minutes

Ever felt uneasy doing your online banking in your favorite coffee shop?<p>Me too.<p>Are you sure you want to hit “buy” on that chic blue and black (or was …

Wi-Fi

U.S. Businesses Say They're Ready for Cyber Attacks; Employees Have Different Answer

U.S. Businesses Say They’re Ready for Cyber Attacks; Employees Have Different Answer<p>June 6, 2017<p>U.S. employees remain unprepared for cybersecurity …

No Monday Morning Reprieve for Cyber Attack Victims

May 14, 2017 by Jordan Robertson and Rebecca Penty<p>An unrivaled global cyber-attack is poised to continue claiming victims Monday as people return to …

Ransomware Attacks Quadrupled in 2016; They'll Double in 2017: Beazley

Ransomware Attacks Quadrupled in 2016; They’ll Double in 2017: Beazley<p>February 3, 2017<p>Specialty insurer Beazley, which offers data breach response …

Reusing Passwords Will Kill Your Business

Do you reuse passwords? If so, it's just a matter of time before the bad guys break into your network, your laptop, your bank account, and your …

Security

The FTC’s Internet of Things (IoT) Challenge

One of the biggest cybersecurity stories of 2016 was the surge in online attacks caused by poorly-secured “<b>Internet of Things</b>” (IoT) devices such as …

Internet of Things

Cyber Criminals now spreading ransomware through Facebook, LinkedIn

If you find a graphic or image on your computer and you don’t remember downloading it, stop before opening! Experts have seen a dramatic increase in …

776,000 patient health records breached in October

The number of patient health information breaches was down again in October for the second month in a row, but swaths of patient data have been …

FTC lays down the ransomware law

The chair of the Federal Trade Commission (FTC) is advising businesses that the FTC might hold them accountable for not fixing vulnerabilities …

Ransomware

Hacking Your Phone

The Three Biggest Mistakes Non-IT People Make When They Plug Things In

This might sound silly at first, but it's not. If you're not an IT Professional, you may be plugging some things in wrong - costing yourself …

USB 3.0

Flaws in wireless keyboards let hackers snoop on everything you type

Many popular, low-cost wireless keyboards don't encrypt keystrokes.<p>Your wireless keyboard is giving up your secrets -- literally.<p>With an antenna and …

DropBox is Not Your Friend

Let me start out by saying that DropBox CAN be the perfect solution for many small businesses - IF it's the solution to the right problem!<br>There's an …

Dropbox

How Not To Have A Sucky Password: The Secret

How Not To Have A Sucky Password<p>Yeah, yeah, yeah…I know. I just got through writing a blog post HERE saying your password needed to die. Knowing that …

Hackers stole $80 million from a central bank because it had $10 routers and no firewall

DHAKA (Reuters) — Bangladesh's central bank was vulnerable to hackers because it did not have a firewall and used second-hand, $10 switches to network computers connected to the SWIFT global payment network, an investigator into one of the world's biggest cyber heists said.<p>The shortcomings made it …

Security

Tick, tock: Jigsaw ransomware deletes your files as you wait

Victims of the new ransomware strain will see their files vanish before their eyes if they don't pay up.<p>A new breed of ransomware has ramped up the …

10 Things You Should Know About Cybersecurity

1. Lack of Email Security Poses a Major Threat to Most Organizations<p>According to Mimecast, employees who are careless with their enterprise email …

“Locky” ransomware – what you need to know

<i>Thanks to the Emerging Threats Team at SophosLabs for their behind-the-scenes work on this article.</i><p>“Locky” feels like quite a cheery-sounding …

Security vs convenience: The story of ransomware spread by spam email

Peter Mackenzie shows you why security is important and how security settings are keeping us all safe.

Information Security

Hollywood Hospital Held Hostage By Hackers Asking $3.6M Ransom To Release Network From Malware | International Business Times

A California hospital’s computer network is under attack by hackers who won’t go away until they’re paid $3.6 million, according to the Verge. The …

Where do US presidential candidates stand on privacy and surveillance?

The US presidential election season is in full swing – the first voting of the long campaign took place Monday (1 February) in Iowa.<p>Cybersecurity and …

Even the best antivirus likely can't save your files from a ransomware infection

With new types of computer viruses being released every day, the internet can be a dangerous place, especially if you value the files on your computer.<p>One of the most prevalent forms of malware out there right now is called ransomware, a virus that encrypts a user's files, leaving them scrambled …

Anti-Virus Software

Top Cyber Threats for 2016; Integrity Attack on Financial Sector Likely

November 30, 2015<p>Businesses should expect cyber criminals to attack through wearable devices, employees’ home systems, cloud services and automobiles …

CryptoWall 4.0 Released With Filename Encryption Feature

<b>CryptoWall 4.0 has been released recently and the latest version of the notorious file-encrypting ransomware brings several notable changes.</b><p>According …

You may be a cybersecurity risk to your employer, and not even know it: CompTIA report

CLEVELAND, Ohio -- They dropped the USB sticks around downtown, then waited to see who would take the bait.<p>Many did. However, those picking up the …

7 Deadly Data Backup Mistakes to Avoid

I used to be the worst with backups. They were simply too easy to neglect. Finally, after several stressful situations over the years, I decided to …

National Cyber Security Alliance

Mar 3, 2017<p>We must protect our children until we teach them the basics of online security. Here are some tools that can help you make the internet a …