Email might seem trivial to some people, but if you are active in using the internet to bank, shop, conduct research, ship items, sell items at auction, and a myriad of other activities your life revolves around email. If a hacker were able to take over your email account they could reset passwords to all... Continue reading What Can a Hacker Do With Your Email Address?
Computer Virus A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions. In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates. A virus operates by inserting or attaching itself to a... Continue reading The Terminology of Malware – What You Need to Know
I often hear people say that they don’t understand why a hacker would be interested in their computer and subsequent life. When you consider how much you do on your computer, it becomes clear that the value of your computer lies in the life you have built over your lifetime. This image shows you what... Continue reading What Can a Hacker Do With Your Computer?
Briggs and Stratton, a maker of gasoline engines for outdoor power equipment, were breached and client information was stolen. NATURE OF THE BREACH Briggs and Stratton experienced a malware attack(software that is intended to damage or disable computers and computer systems) on Briggs’ computer systems at its Milwaukee, Wisconsin and Munnsville, New York locations that potentially compromised information... Continue reading Briggs Stratton Healthcare Information Breach 2017
The key to securing data is to have positive control of it so only the people that need to access it can and when they need to. Wireless networks pose a challenge to this goal because unlike wired connections wireless networks are reachable for up to 100 feet outside of the home or business. If someone... Continue reading Security Best Practices for Wireless Networks