Blog
Whose Responsibility is it to Secure IoT?
IoT (Internet of Things) comes with security risks. But who is responsible for locking it down? The manufacturer? The Government? The organization? The end...
An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates,...
Nice Addition to Google Slides
One of the things users have been asking for in Google Slides is the ability to insert audio. There are a few add...
'Tis the Season...
‘Tis the season to be wary. The Grinches seem to multiply during the holiday season. Responding to some of these phishes can lead to identity...
What's in a Name?
Alexa. The 39th most popular girls name in 2006 has created some problems in today’s Internet of Things world. “Alexa, do you need a tissue?” An innocent...
DDoS for Hire
DDoS-As-A-Service. DDoSaaS. A Distributed Denial of Service is a malicious attempt to stress a network or server by overloading it with massive amounts of data....
Resources for Digital Accessibility
There are a number of laws and guidelines relating to digital accessibility, both on the federal and state levels, and there is a...
Ransomware: Anatomy of an Attack
Ransomware is on the rise. This malicious software is designed to block access to a computer system and it’s files unless a ransom is...
Cyberbullying
Cyberbullying is bullying. The difference is that cyberbullying is bullying through the use of technology. Various forms of technology could be social media, text messaging...
Malware Focus: Rootkits
A rootkit is simply a set of tools that can maintain root privileged access to an operating system. BUT if a rootkit is deployed as...
Do You Need Antivirus Software?
Do you still need antivirus software? Yes. Why? Because malware, in all forms, is still pervasive on the Internet and it wants to attack you,...
Scam Focus: Gift Card Purchase
Scenario: Donna is the supervisor of XYZ.org. Sam is an upper management employee. ******************************************************************** From: Donna Boss <DonnaBoss@scammer.com> To: Sam Scammed <SamScammed@XYZ.org> Subject: Quick Purchase Needed Sam, can...
A Few of Our Favorite Things
This week we will focus on some great resources that you should be looking at on a regular basis. If you don’t have an RSS...
Malware Focus: Dridex
Dridex is a form of malware, spread through the use of email, whose main goal is stealing banking credentials through the use of macros...
Internet Fraud
Internet fraud is an unfortunate byproduct of having worldwide access to resources, products and information. Among these risks are phishing scams, malware and...