Profile cover photo
Profile photo
TJM Professional Services
About
Posts

Post is pinned.Post has attachment
Password Tips for home and business
Add a comment...

Post has attachment
Who is Responsible for Security?
Ultimately, management (including the owners) are responsible for the implementation and oversight of both the Information Security and Physical Security programs of an organization.  So when you read about a data breach where a retail vendor had thousands ...
Add a comment...

Post has attachment
Information Leakage - Using the Internet Judiciously
One of the best online resources for cyber criminals is Google.  While businesses seek to utilize their company website, Facebook, Twitter, LinkedIn, and the like for marketing and recruitment purposes, they are unintentionally leaking information that can ...
Add a comment...

Post has attachment
How to Overcome Your E-mail Insecurity - Part 3 of 3
Phishing Less complex than BEC, but even more widespread, phishing e-mails will usually come from free e-mail providers, ex. gmail, yahoo, outlook/hotmail, but will have a display name that is different than the actual e-mail in trying to gain your trust.  ...
Add a comment...

Post has attachment
How to Overcome Your E-mail Insecurity - Part 2 of 3
Business E-mail Compromise (BEC) For the last two years this has been a growing threat to small businesses.  It is a phishing e-mail, whereby the hacker poses someone of authority, your boss, the CEO, the CFO, the IRS, etc. and asks you to send either your ...
Add a comment...

Post has attachment
How to Overcome your E-mail Insecurity - Part 1 of 3
As a small business owner you probably have a lot of things keeping you up at night.  Your use of E-mail in doing business probably wasn't one of them, until you read this post. E-mail was not designed to be secure.  It was created to be a simple electronic...
Add a comment...

Post has attachment
Phishing is not a Technology Problem
In reading the title of this post, IT folks all around the world are shouting at the top of their lungs; "Amen!". While perhaps not a profound statement for the IT community, it is however a true statement that phishing is not an IT risk, but it is a Busine...
Add a comment...

Post has attachment
"Are you still in the office?" - A Phishing Story
The below is based on a true story: Monday at 5:00 pm - You are just leaving the office. You happen to have left the office on time today (for once) for your kid's soccer game, a happy hour, a hot date, or whatever.  At 5:35 pm you get an e-mail from your b...
Add a comment...

Post has attachment
Information Security tips for Small Businesses
Add a comment...

Post has attachment
Gone Phishing
Phishing, or the act of trying to deceive folks into thinking you are someone else in the hopes of scamming either user credentials, data, or money out of them, is occurring at an alarming rate.  This is also becoming a delivery mechanism for ransomware. So...
Add a comment...
Wait while more posts are being loaded