The Dark Side of Smart Cities Listen to Felicia's podcast episode Your browser does not support the audio element. Dark side of smart cities https://www.axis.com/blog/secure-insights/what-smart-city A clothing line designed to dis... Cybersecurity Data Privacy Aug 10, 2023 Educational Articles
How to get ripped off by cloud hosted server providers Listen to Felicia's podcast episodes Cloud Hosted Servers are Usually a Rip-Off Your browser does not support the audio element. 10 Questions for IT Firms - Part 2 Your browser does not support the au... Procurement Aug 10, 2023 Educational Articles
10 Questions for Evaluating IT Firms - Debunked Listen to Felicia's podcast episodes Part 1 Your browser does not support the audio element. Part 2 Your browser does not support the audio element. Summary A franchise recently published an article t... Procurement Aug 10, 2023 Educational Articles
Understanding fileless ransomware and mitigation techniques Listen to Felicia's podcast episode Your browser does not support the audio element. Fileless Ransomware Ransomware and malware in general is harder to detect and defend against than ever before. Unde... Cybersecurity Security Strategy Aug 9, 2023 Educational Articles
Criminal Fraud in IT Listen to Felicia's podcast episode Your browser does not support the audio element. Learn from the mistakes of others in order to prevent being the victim of criminal fraud in IT. Real life example o... Best Practices Cybersecurity Vendor Risk Management Aug 9, 2023 Educational Articles
How to secure your backups from ransomware Listen to Felicia's podcast episode Your browser does not support the audio element. PETYA crypto ransomware overwrites MBR http://blog.trendmicro.com/trendlabs-security-intelligence/petya-crypto-rans... Backups Cybersecurity Ransomware Aug 9, 2023 Educational Articles
Leaving Computers On All The Time Turn off, or not? I was recently asked the following question. "I say that leaving my computer on overnight does not expose it to hacking, but some disagree with me. (You advised me to leave it on as ... Best Practices Hardware Maintenance Aug 8, 2023 Educational Articles
S.M.A.R.T. is smart for hard drives S.M.A.R.T. is self-monitoring, analysis, and reporting technology for hard drives. This technology used to be an optional component on hard drives, but it is now included on all newly manufactured har... Best Practices Hardware Monitoring Aug 8, 2023 Educational Articles
Why are SOHO Routers Insufficient? There has been a lot of talk in the news lately about the inadequacy of SOHO routers, and I couldn't agree more. For more than ten years, I have been advocating the use of real, XTM (extensible threat... Hardware Router Aug 8, 2023 Educational Articles
Understanding Security Appliances What is a security appliance A security appliance is a device that protects the perimeter and the inside of your network. The perimeter is secured because the security appliance is between the interne... Cybersecurity Firewall Hardware Router Aug 8, 2023 Educational Articles
Why We Must Block Advertisements Blocking advertisements specifically and by category can save your computer from getting infected or otherwise hacked. I have been talking about this fact for years and have been actively blocking adv... Best Practices Cybersecurity Data Privacy Aug 8, 2023 Educational Articles
Computer Security & Maintenance Self-Assessment The following is a computer systems security and maintenance self-assessment that organizations of all sizes can use to test their overall security strategy. Most of this list is also applicable to re... Assessment Cybersecurity Aug 8, 2023 Educational Articles