Why and How Cyber Criminals Attack Small Businesses
| |

Why and How Cyber Criminals Attack Small Businesses

The challenge that small businesses face is daunting. In this day and age, there are bad actors around the globe that earn their living by compromising businesses, and those cybercriminals are just as good at their jobs as the small business owner is at selling and delivering their products and services. When is the last…

Storing Passwords in the Browser Isn’t the Real Problem

Storing Passwords in the Browser Isn’t the Real Problem

If you follow tech news, it happens about every other day when some blog post goes viral which says, “why you shouldn’t store passwords in Chrome”, “why you should dump Chrome”, etc. And when I say “viral”, by that I mean it gets picked up by news aggregator sites like Google News, and then posted…

Log4j Vulnerability Underscores a Negative Side Effect of Open Source
|

Log4j Vulnerability Underscores a Negative Side Effect of Open Source

I am not going to talk about the Log4j vulnerability and how to determine if you are impacted and how to recover. I am sure there are plenty of articles on that. In my view, the more important discussion is had by taking a hard look at the open source software model and considering the…

Why You Shouldn’t Answer Facebook Posts Asking Seemingly Benign Questions

Why You Shouldn’t Answer Facebook Posts Asking Seemingly Benign Questions

Within the past 30 minutes, three of my Facebook friends have answered posts from “Thinkarete Lifestyle”, and I about feel out of my chair. Let me explain why, and why you should not do this. In short, these questions are designed to get you to expose little bits of information which, when they are all…

Free Online Seminar: Strategies for Seriously Reducing Your Personal and Business Risk of Impact From Cyber Crimes

Free Online Seminar: Strategies for Seriously Reducing Your Personal and Business Risk of Impact From Cyber Crimes

This Wednesday, February 24, Thomas Carlisle will host a zoom meeting to provide free advice: cyber security essentials for the online user and business. This session is free to members and family and employees of those registered as members in the Facebook group “Entrepreneur Networking Group for Success”. I will follow-up here with written answers…

IT Security Alert: Drop Everything and Take Action Now

IT Security Alert: Drop Everything and Take Action Now

Last week, several news sites that focus on IT Security reported that data dumps have been found on the Dark Net with over 3 billion user account credentials. Some are calling it “COMB” which stands for Compilation of Many Breaches. It is believed that this large number of breached account credentials was not the result…