Profile cover photo
Profile photo
powersolution.com
6 followers
6 followers
About
Posts

Post has attachment
With the continued proliferation of cybercrime in 2017, it appears 2018 will be another year of the “good guys” trying to keep pace with the “bad guys”.  The data breach environment is one of continual change.  It is anticipated that breaches will be bigger and more prevalent, driven by ever-increasing sophistication of hackers and their persistent nefarious activities.   As protection techniques improve, cybercriminals are finding more creative ways to circumvent security measures.
Add a comment...

Post has attachment
Antivirus must protect all 4 of major areas.

When people think of antivirus protection, the area that comes to mind is the personal computer, being the obvious. Most often, people tend to forget that they access company data not just from their desktop workstation, and that data resides in more then one location.
Add a comment...

Post has attachment
The outside forensic experts Yahoo had hired to investigate the breach concluded that forged cookies may have allowed an intruder to access users’ accounts without a password in 2015 or 2016 to access compromised identified account. Yahoo had issued a security notice about the breach, and invalidated the forged cookies so they cannot be used again. Features like autofill and cookies are a convenience to the users, but by nature they can also be a major threat to the safety and security of your personal and sensitive information. http://hubs.ly/H06mpHt0
Photo
Add a comment...

Post has attachment
Remote mobile devices such as laptops, tablets, etc. with a remote connection to the corporate network create a potential entry point for security threats. Here are our 11 Tips on taking precautions to secure your endpoint technology and keep your network protected from external threats.
Add a comment...

If you and your family members are using a home PC to play games, access Google+, LinkedIn, Snapchat, Facebook and shop online (Holidays are coming), ask yourself: are you diligently updating and monitoring the antivirus software, firewall and security patches on the machine?

If you the answer is NO, or even if you are not sure, then there’s a HIGH PROBABILITY your devices are infected with spyware or malware, perhaps even unbeknownst to you.

[read full article and get or Free Report, "The 7 Most Critical IT protections Every Small Business Must Have In Place", protect yourself from cybercrime, data breaches and hacker attacks]
Add a comment...

Post has attachment
There is a sneaky bait and switch trick used by some hackers. It works like this: they register and set up a fraudulent website that is a very close misspelling of a legitimate one. For example, amercanexpress (did you catch he missing letter i ?) instead of americanexpress Did you know Some anti-virus software, such as our partner ESET provide Anti-Phishing protection. With Anti-Phishing option (enable by default) you can block web sites known to distribute phishing content.
QUICK TIP: bookmark (or add to favorites) important legitimate sites you visit - it will minimize the chance of mistyping the URL or clicking on malicious link.

http://hubs.ly/H04MWZ00
powersolution.com
powersolution.com
powersolution.com
Add a comment...

Post has attachment
If you plan on catching up on some work from home AND you’re using a personal device such as a smartphone or personal laptop – DON’T! Unless your personal device is covered under professional managed services or security plan, you could accidentally introduce a virus to the company’s network.

ONLY devices that are under our vigilant watch of patching, updating and monitoring should be used to work remotely.

http://hubs.ly/H04LS1g0
Photo
Add a comment...

Post has attachment
Did you know your COMPANY’S bank account doesn’t have the same protections as a personal bank account? WHAT? If a hacker takes money from your business account, the bank is NOT responsible for getting your money back. (Don’t believe me? Call your bank and ask them what their policy is on refunding you money stolen from your account!) Many people think FDIC protects you from fraud; it doesn’t. It protects you from bank insolvency, NOT fraud.

http://hubs.ly/H04LRyr0
Photo
Add a comment...

Post has attachment
Scared of Ghosts this Halloween? Be afraid of the real threat: losing all your data.

Ransomware is old news BUT!!! what makes it worthy of being in the news - it keeps evolving, and reappearing, stronger and meaner with each version - and that is why it should be on top of everyone's priority list when thinking cybersecurity.

Maintain a full, daily backup of your data OFF-SITE so that IF you do get hit with ransomware, you can recover all your files quickly

[follow our link for full article]
Photo
Add a comment...

Post has attachment
Have you seen this? You are working on your computer and everything seems fine, when all of the sudden – POP! – a pop-up window alerts you that that your PC is infected with a virus and you must “click here” or "remove all" to run a scan or install and upgrade antivirus software. Your first reaction is to panic and click the warning to run the antivirus. That is what the crooks are counting on. This is a common scareware tactic. Hackers use social engineering strategies to get you to click and download a virus or other form of malware.


Photo
Add a comment...
Wait while more posts are being loaded