Grundig IT Newsletter Computing News That You Can Use - January 2022 File Encryption and BitLocker NOTE: To browse ALL past Newsletter topics that we have covered over the years, go here Quote of the Month "Change begins at the end of your comfort zone." —Roy T. Bennett The biggest word in IT currently is ‘Security’. If you follow the tech world, you’re hearing a lot of variations on that theme: Malware, ransomware, spyware, firewall, antivirus, procedure, backup, etc. All of it … [Read more...] about File Encryption and BitLocker
Computer Security for my Business
Grundig IT Newsletter
Computing News That You Can Use - September 2021 Passwords - How to choose good passwords and manage them Quote of the Month "The way to get started is to quit talking and begin doing." - Walt Disney Nobody like having to deal with passwords but they are used everywhere. Every website and every company has their own idea how to handle password policy. Let's discuss common problems with passwords, common solutions you can use, and tools that can help you check … [Read more...] about Grundig IT Newsletter
The Ransomware Industrial Complex – And How To Deal With It
Grundig IT Newsletter Computing News That You Can Use - July 2021 Quote of the Month: "You only live once, but if you do it right, once is enough." - Mae West The Ransomware Industrial Complex - And How To Deal With It NOTE: To read this newsletter online or to browse past topics that we have covered over the years, go here. As the ransomware threat is increasing, different players in the ransomware ‘game’ are interacting with each other to make it ‘worse.’ The main way to measure … [Read more...] about The Ransomware Industrial Complex – And How To Deal With It
How Email Phishing Can Harm You and How to Recognize Scams
If an email phishing attempt is successful there are two general things that can happen. Generally, the most common is sensitive information is gathered about accounts that you hold, and less common is something gets installed on your computer that can perform various actions without your knowledge. Read on to learn more about how to protect yourself... Information Can be Recorded The information that is recorded from you depends on the attacker. If your login credentials are recorded, the … [Read more...] about How Email Phishing Can Harm You and How to Recognize Scams
May Newsletter: Remote or Local Backup and Ransomware
Last month, we discussed Windows 7, which will be going away soon.This month - Ransomware, which remains a threat. Find more on Blog at GrundigIT.comAs Always, Happy Computing! -- Tom Grundig Ransomware has a very literal name. Once it gets onto a computer, usually by downloading it by accident from an email or website, it will deny access to all data on the computer until a ransom is paid (even paying the ransom may not work). Prevention and Mitigation: CISA (Cybersecurity … [Read more...] about May Newsletter: Remote or Local Backup and Ransomware
November Newsletter: Computer Security
Last month, we talked about G Suite and its various features. This month's subject is Computer Security. We've covered it before, but computer security is ALWAYS important. As Always, Happy Computing! And Happy Thanksgiving! -- Tom Grundig Antivirus for Computer Security Even though it is not always perfect, having antivirus is important. Windows 8 and Windows 10 have Windows Defender preinstalled as part of the operating system. In almost every case, Windows … [Read more...] about November Newsletter: Computer Security
Firewalls: What, Why, How
Computers, laptops and other devices that connect to the Internet are vulnerable potential targets for a range of different threats. Firewalls are one defense to know about above all others, as a basic foundation of security. What is a firewall? Firewall is a term used to describe a barrier protecting something. Be it protecting a building from fire or a computer network from dangers, firewalls are barriers. In terms of computers, firewalls can either be software or hardware that monitors … [Read more...] about Firewalls: What, Why, How
Why Have Your Company’s Cybersecurity Evaluated
Experts estimate that the global market for cybersecurity products this year will exceed that of the last year. Cybersecurity is often an obscure or neglected area in organizations. Most companies put basic security defenses in place and then forget about it. Organizations scale or grow with time. So their IT setups and digital resources witness a lot of changes over time too. While these developments may boost your productivity, they open up your organization to newer and more complex risks. … [Read more...] about Why Have Your Company’s Cybersecurity Evaluated
Why Get a Security Assessment?
There are many specific reasons to get a security assessment: You’ve had a data breach There has been loss of memory or destruction of data A virus has infected your systems Or something else has obviously gone wrong But there is a very large and less pin-pointable reason that every business should have a periodic Network Security Assessment: because you aren’t sure your systems are secure. You hope so. And you think so. At some point in the past you knew that your … [Read more...] about Why Get a Security Assessment?
June Newsletter: Backup Technology
Last month, we discussed Computer Security This time: The latest in backup technology and services offered by companies like Datto. Find more on Blog at GrundigIT.com As Always, Happy Computing! -- Tom Grundig Network-driven Local and Cloud Backup Technology with Virtualization Network driven backups have been a thing for a while now, but a new wave has hit in the recent years. We feel we should discuss the differences between devices of the past, and the new age that has been passed … [Read more...] about June Newsletter: Backup Technology
