Post has attachment
Add a comment...

Post has attachment
Train yourself, Train your users, Train your helpdesk staff ... in fact, Never Stop Training! (http://gplnk.co/2hGhTSx)

As data breaches, phishing scam, malware, viruses, etc. etc. etc. continue to bombard us at an ever increasing rate, it's important that individuals and businesses try to keep up by being aware of potential dangers lurking in their email box, on the websites they visit, of how to protect their personal data, etc. etc. etc.

Cybercriminals never stop coming up with new ways to compromise us and our data, so it is important that we never stop learning and never stop training to combat these threats.

On this blog post, we cover the story of a cybersecurity breach of John Podesta’s emails that was given the go-ahead by his helpdesk staff member ‘Charles Delevan’. It was a rookie mistake, and even John Podesta himself was suspicious of the email.

Read More: http://gplnk.co/2hGhTSx

+Computer Security Solutions LLC specializes in BEST OF BREED software based and hardware based security solutions – the kind of protection system that every business needs. Computer security and related security solutions are our business; from Endpoint Protection to Encryption to Backup and Disaster Recover – we have it all!

#security #computer #business
Photo
Add a comment...

Post has attachment
Let's Talk About Multi-Factor Authentication (MFA) (http://gplnk.us/2o15JKS)

Sorry folks, this isn't a romantic tale of authentication ... it's serious business and for many of our clients, multi-factor authentication helps keep their data secure every day.

For those that don't know multi-factor authentication (MFA) or two factor authentication (2FA) is the process of using a multi-step verification of access to a system. This normally works by providing a username and password, plus one additional form of identification.

How ESET Secure Authentication 2FA Works

Unlike standard password authentication, 2FA OTP requires two elements: a user’s password and an OTP generated on a designated physical device. It is the physical device requirement that sets 2FA OTP methodology apart.

With each login, a new OTP is required, meaning access to the device is required. Should the user’s password be compromised, a criminal could not gain access to your network as they do not have the complementary device.

Does this sound like the kind of enhanced security you could use for your business? Click here to learn more: http://gplnk.us/2o15JKS

+Computer Security Solutions LLC specializes in BEST OF BREED software based and hardware based security solutions – the kind of protection system that every business needs. Computer security and related security solutions are our business; from Endpoint Protection to Encryption to Backup and Disaster Recover – we have it all!

#MFA #ESET #security #computer #business
Photo
Add a comment...

Post has attachment
Which do you think it better when it comes to secure passwords? Stronger ... or Longer? (http://gplnk.us/2gWuZxI)

Believe it or not, a long password of 4 or more words could take "a lifetime" to crack whereas a short but much more complex password could theoretically be cracked within in a few days by a brute force attack.

Remember: The strength of the password comes from the length of the password!!

One of the ways to ensure that your identity, your banks, and your money, are secure is to use long and UNIQUE passwords for all your HIGH VALUE sites.

Unfortunately, many websites seem to compromise your security for you by forcing password policies between 8 and 12 characters.... and there's not much you can do about it but follow their rules. Hopefully, they will catch on someday soon and start making 60 characters the minimum.

Read More: http://gplnk.us/2gWuZxI

+Computer Security Solutions LLC specializes in BEST OF BREED software based and hardware based security solutions – the kind of protection system that every business needs. Computer security and related security solutions are our business; from Endpoint Protection to Encryption to Backup and Disaster Recover – we have it all!

#security #computer #business
Photo
Add a comment...

Post has attachment
Let's Talk About the Free WiFi Zone (http://gplnk.us/2o0TdLr)

In theory, Free WiFi is great ... and with an expected 350 million WiFi hotspots around the world by 2018, it certainly is convenient. The problem is that the widespread acceptance and availability of free WiFi poses significant security risks.

Before you connect to that free public WiFi hotspot, you should educate yourself on how it works, what the potential security risks are, what you should or should not be sending over public WiFi, what you could do to minimize your risk, and what you should be looking out for when connecting to public WiFi.

Before you even think about connecting to public WiFi, be sure that your operating system, browser, and all software are up-to-date and that you have a security software solution installed.

For the answers to these questions, click here: http://gplnk.us/2o0TdLr

+Computer Security Solutions LLC specializes in BEST OF BREED software based and hardware based security solutions – the kind of protection system that every business needs. Computer security and related security solutions are our business; from Endpoint Protection to Encryption to Backup and Disaster Recover – we have it all!

#security #computer #business
Photo
Add a comment...

Post has attachment
Watch out for this (almost) impossible to detect phishing attack: (http://gplnk.us/2o0Ycf1)

If you use Google Chrome, Mozilla Firefox, or Opera browsers, this almost impossible to detect phishing attack should be on your radar... but even if it is, the problem with things that are almost impossible to detect is that ... well, they are almost impossible to detect!

Apparently, some saavy hackers found a way to register domain names using unicode characters. These domains LOOK like they are legitimate, even though they are not.

If you really have no idea what we are talking about, click the "proof-of-concept" link in our article to see an actual example created by security team at Wordfence which demonstrates a unicode domain spoof of the “epic.com” domain.

Security researcher Xudong Zheng from China, who discovered the attack said:
“It becomes impossible to identify the site as fraudulent without carefully inspecting the site’s URL or SSL certificate.”

Read More: http://gplnk.us/2o0Ycf1

+Computer Security Solutions LLC specializes in BEST OF BREED software based and hardware based security solutions – the kind of protection system that every business needs. Computer security and related security solutions are our business; from Endpoint Protection to Encryption to Backup and Disaster Recover – we have it all!

#security #computer #business
Add a comment...

Post has attachment
Per Usual, Watch Out for Phishing Attacks This Tax Season! (http://gplnk.co/2nW8mxp)

Each and every year, cybercriminals prey on victims during tax season, using phishing attacks to impersonate the IRS and in order to target unsuspecting tax payers. This year, as in recent past years, the Internal Revenue Service has issued a statement to warn tax payers against these scam.

“These email schemes continue to evolve and can fool even the most cautious person. Email messages can look like they come from the IRS or others in the tax community,” said IRS Commissioner John Koskinen. “Taxpayers should avoid opening surprise emails or clicking on web links claiming to be from the IRS. Don’t be fooled by unexpected emails about big refunds, tax bills or requesting personal information. That’s not how the IRS communicates with taxpayers.”

You can lower your own chances of becoming victim of phishing scams by being aware of the current scams and by calling the person or company that you think the email is from (before clicking a link) whenever you are suspicious. Of course, you should always make sure that your operating system, software, and antivirus are up-to-date, as well.

Read More: http://gplnk.co/2nW8mxp

+Computer Security Solutions LLC specializes in BEST OF BREED software based and hardware based security solutions – the kind of protection system that every business needs. Computer security and related security solutions are our business; from Endpoint Protection to Encryption to Backup and Disaster Recover – we have it all!

#security #phishing #taxes
Photo
Add a comment...

Post has attachment
Even tech-savvy Gmail users are falling victim to hackers who are stealing their login credentials as increasingly sophisticated phishing techniques are being employed. (http://gplnk.us/2jzhOU7)

The way this phishing scam is being carried out is able to fool even tech-savvy users. An email that seems to come from someone you know, includes what seems to be a legitimate attachment. You click it and it opens a Google account login page. While savvy Gmail clients already know to check the address bar in their web browsers to determine if the address is legit, the hackers in this scenario have replicated the appearance of the Google accounts login page in the address bar. Once they enter their email and password, hackers have stolen your credentials and have full access to all of your emails.... and they seem to be logging in almost immediately.

Unfortunately, there is no sure way to check if your account has been compromised. If in doubt, change your password.

Read More: http://gplnk.us/2jzhOU7

+Computer Security Solutions LLC specializes in BEST OF BREED software based and hardware based security solutions – the kind of protection system that every business needs. Computer security and related security solutions are our business; from Endpoint Protection to Encryption to Backup and Disaster Recover – we have it all!

#gmail #security #hackers #phishing #cybersecurity  
Photo
Add a comment...

Post has attachment
Stay Safe Online! (http://gplnk.co/2pay2pM)

Did you know that there are some very simple ways that you can greatly decrease the risk that your accounts will be compromised, your computer infected with malware, or that you will lose all of your data by taking a few easy precautions? For example:

Things like making it a habit to always keep your computer and software up-to-date should not be considered "optional" as outdated operating systems and high-risk programs makes your computer extremely susceptible to malware.

Using strong passwords and not reusing them across multiple sites means that the chances of them being hacked is lower; however, if one of them is compromised, you reduce your exposure to that single site.

Installing malware protection is essential. Trojans, viruses, keyloggers, zombie code, spyware, adware and more are continuously finding new ways to make it onto your PC, and a good antivirus/antimalware solution will use a combination of signatures and heuristic (behavior based) detection to determine if you’re infecting your machine – and hopefully stop that infection dead.

Read More Security Tips: http://gplnk.co/2pay2pM

+Computer Security Solutions LLC specializes in BEST OF BREED software based and hardware based security solutions – the kind of protection system that every business needs. Computer security and related security solutions are our business; from Endpoint Protection to Encryption to Backup and Disaster Recover – we have it all!

#cybersecurity #cyberaware #security #infosec  
Photo
Add a comment...

Post has attachment
Security Updates April 2017 (http://gplnk.co/2o6mJuq)

Microsoft’s April 2017 security updates address 40+ vulnerabilities ranging from critical, important, and moderate severity levels. The patches include three zero-day flaws that have been exploited in the wild.

According to Microsoft, these updates resolve flaws affecting Edge, Internet Explorer, Windows, Office, Visual Studio for Mac, .NET Framework, Silverlight and Adobe Flash Player components – so there is a high degree of chance that your windows machine is affected, almost 100% chance!

Adobe's April 2017 security updates patch nearly 60 vulnerabilities across several of their products. The updates for Adobe Acrobat and Adobe Reader address 47 flaws, including many that could lead to arbitrary code execution. The remaining updates impact Adobe Flash Player, Adobe Photoshop CC for Mac and Windows, Adobe Campaign, and the Adobe Creative Cloud Desktop Application for Windows.

Be sure to visit our blog for more information about these and more security patches: http://gplnk.co/2o6mJuq

+Computer Security Solutions LLC specializes in BEST OF BREED software based and hardware based security solutions – the kind of protection system that every business needs. Computer security and related security solutions are our business; from Endpoint Protection to Encryption to Backup and Disaster Recover – we have it all!

#security #cybersecurity #updates
Photo
Add a comment...
Wait while more posts are being loaded