What steps do you take to stay safe online? Google recently conducted a survey of IT security experts and web users who aren’t security experts to see where they differed. The results are interesting.
Computer networks are hacked all the time, but what does that really mean? How does hacking work? There are a number of different individual approaches that clever cybercriminals use, but there is a common overall strategy. If you have a computer nerd curiosity, here’s an overview of the approach.
Business losses from ransomware aren’t going away. In fact, the latest version of CryptoLocker, 3.0, is considered the most advanced and most damaging ransomware in the wild at the moment, and it’s targeting U.S. businesses and individuals. We can all take action at our computers every day to help avoid ransomware. Here’s how.
The odds of businesses of all sizes being reviewed by Microsoft for licensing compliance has increased. Since the beginning of 2015, 12% of CRU clients have received Microsoft review requests, and we expect that number to grow. Microsoft plans to conduct these reviews with customers every 2-3 years.
Social engineering (SE) is the art of manipulating people so they give up confidential information. While the term itself is relatively new, the idea goes back to the beginning of time. Those who use social engineering online today are called phishers or scammers, and in the old days they would have simply been called con men.
I started using OneNote as a way to get the Post-It notes off my desk. It seemed like a simple way to store little pieces of information that didn’t belong anywhere else. In OneNote, I could easily find and track them. Now, I hardly ever use Post-Its (sorry, 3M). The good news is, if you use Microsoft Office, you probably already have OneNote, so it’s easy to give it a try.