We recommend developing a planned strategy for retiring obsolete technology. Planning ahead can save you time, money and mitigate risk. When developing a technology replacement plan, on average, expect to retire 20 to 30 percent of your technology each year to ensure no device is older than four years old.
Cybercriminals have grown more brazen and ambitious in their ransomware attacks — when hackers hold their victims’ data hostage and demand a payment to release it. Increasingly, the attacks are targeting entire networks and cloud services, and not just individual computers. However, there are several ways organizations can help mitigate the risk of ransomware attacks, many of which we have already written about in previous articles as IT management best practices.
Your telephone and email are vulnerable points of attack by hackers, but you can guard these portals with simple security steps. Ed Bott with ZDNet.com reports on devastating hacking incidents that could have been prevented. Continue reading for tips to protect your phone and email data from devastating attacks.
Unlike milk, passwords don’t need an expiration date. That’s the conclusion of Microsoft, which recently announced that it will no longer attach expiration dates as part of its security requirements.
While cybersecurity remains a burning issue for organizations in 2019, many businesses and nonprofits don’t plan on or budget for a cybersecurity risk assessment. However, once organizations understand the value of their data and reputation, assessments often become a regular component of their tech management strategies.
Sophisticated phone phishing scams are on the rise and agencies are urging people to be aware of telephone scams from callers posing as Internal Revenue Service agents. Learn more about how these complex phone phishing scams work, how to recognize and report them.
Data Privacy Day, held this year on Monday, January 28, is the perfect opportunity to take stock in your organization’s data privacy and security policies. There are several ways to create a culture of data security within your organization, even with a modest security budget. Here, you will find a list of data security priorities that most organizations can easily adopt with a little time, good internal communication, and without a large investment.
Extortion scammers have found a new hook to bait Internet users: old passwords. A new wave of messages that began popping up in mid-July has stepped up the ploy by showing passwords in the subject headers as attention-grabbing ‘proof’ that someone has deeply burrowed into your computer and has your personal information.
Are passwords passé? Increasingly, other security measures are replacing the password, reviving the debate over whether passwords have outlived their usefulness.
A handwriting-recognition feature in Windows collects data and stores it, which could represent a security threat, according to digital forensics experts. Passwords and emails could be among the data stored. One of the first lines of defense remains strong passwords, as well as where you store them.
Office 365 users can expect more email to end up in the junk folder — all for a good cause. Microsoft has ramped up its screening of fraudulent email, offering enhanced anti-spoofing protection for holders of Office 365 accounts.
Ransomware may not claim as many victims as in the past, but earlier this year, the city of Atlanta discovered its potency. Ransomware – a computer attack that holds information hostage — can cause tremendous havoc.
Microsoft Office users may find an unpleasant surprise lurking in the form of an infected, remotely embedded Adobe Flash Player bug. Recently Microsoft announced it would block future content that is embedded with Adobe Flash, Shockwave, and even their own Silverlight platform from Office 365 by January 2019. Microsoft cited that malware authors have been exploiting systems through Word, Excel, and PowerPoint files with embedded content.
Facebook, Twitter, LinkedIn, Microsoft, Strava and Soundcloud are among the major online companies that announced plans to update their terms and conditions to comply with a new privacy law out of the European Union (EU). How will the new regulations work?
When cybercriminals call, they employ an arsenal of tricks and tactics. Now that it’s tax season, Forbes warns that scammers will try to take advantage of tax filers using spoofing and other means to obtain valuable personal data. Hanging up is the safest remedy, but there are other ways to avoid phone scams.
Facebook Messenger has become the latest minefield for unwary computer users, thanks to a new variety of malware that has immerged over the past few months. Even the latest anti-malware and patches cannot prevent every attack. However, there are steps we can all take that can minimize the risk.
Consumers and businesses alike are choosing the convenience and efficiencies of being connected over the security of being "off the grid" (so to speak), and there are no signs of it slowing down. And, right now, the policies for securing these devices is in its infancy, increasing the risk for attacks.
Here at Sinu, we try to provide the latest tech news, predict trends, and share best practices – especially when it comes to protecting your data and other tech assets. Well, here is where taking our own advice paid off...
In less than 3 years, Adobe's once popular plug-in will no longer be welcomed on the web. So, what really happened to Flash? I would say it goes well beyond security issues and is more about the shift in the way we want to receive information from and interact with our devices.
It’s hard enough to keep your technology secure when you’re working from the office, even harder when you work remotely, but while on vacation, it’s even trickier to keep your devices and data safe. A little bit of preparation and being a little tech security savvy can prevent headaches during your summer vacation and the rest of the year.