The 3-2-1 Backup Method: A Bulletproof Plan for Data Safety In today’s digital age, our personal and professional lives revolve around data. From precious family photos to critical business documents, safeguarding this data has never been more crucial. Enter the 3-2-1 Backup Method: a simple yet highly effective strategy to ensure your data remains safe…
Tag: security
Spammers Using Your Email Address?
Who hasn’t gotten a request to remove them from your spam email list or a bounced email that supposedly came from your account. First of all these spammers probably have not hacked your email . You can enter any name into an email client
CrowdStrike Outage: What Happened?
On July 18, 2024, CrowdStrike—an independent cybersecurity company—released a software update that unexpectedly impacted IT systems worldwide. Although this incident wasn’t directly caused by Microsoft, it significantly affected our ecosystem, prompting us to collaborate closely with CrowdStrike and other stakeholders to address the issue and support our customers¹. Immediate Impact Steps Taken to Remediate Lessons…
Require Administrator Password
Make windows require a an admin password when making system changes.
Passkeys, Almost There
A passkey is a digital credential that is used as an authentication method for a website or application. The passkeys standard is a type of passwordless authentication, promoted by the World Wide Web Consortium and the FIDO Alliance. Google has announced that passkeys, touted by the tech giant as the “beginning of the end” for…
How Private Equity Ruined LastPass
As I and all of the news outlets have reported LastPass the password organizer has been breached, and gave up a lot of personal, and business data to hackers. As it turns out this was much bigger than previously reported, and a Wall Street firm is to blame for it. Read about LastPass’s history with…
What’s Your New Password Manager?
LastPass what use to be my preferred password manager has had a hard time the Last couple of years. They have seen multiple security breaches which you absolutely can not have in a mission critical application such as a password manager. LassPass being no longer an option what should you next password manager be. After…
Coffee Shop WiFi, Is It Safe?
A few years back I did a demonstration at KIPCUG on login security, and how I could capture someone’s login credentials using a Firefox plugin called Firesheep. In the demonstration I captured a Facebook users credentials and logged into their account. This was possible at the time because Facebook was not using any encryption in…
Tor, Tor Browser and Tails OS
This post will tell you how to browse the web 100% secure and private. Here’s what you need. Tor The Tor Project is a non-profit open-source company started in 2006 to work on the idea of onion routing. Onion routing passes your browsing through multiple encrypted networks would keep a persons browsing completely private and…
How To Spot Scam Email
We’ve all ran across this, an email that comes in that looks legitimate but something about it doesn’t feel right. What do you do with this kind of email? Do you open it to see what it is about. Did your uncle that you didn’t know you had really leave you a million dollars? Does…
