If an email phishing attempt is successful there are two general things that can happen. Generally, the most common is sensitive information is gathered about accounts that you hold, and less common is something gets installed on your computer that can perform various actions without your knowledge. Read on to learn more about how to protect yourself... Information Can be Recorded The information that is recorded from you depends on the attacker. If your login credentials are recorded, the … [Read more...] about How Email Phishing Can Harm You and How to Recognize Scams
Computer Security for my Business
May Newsletter: Remote or Local Backup and Ransomware
Last month, we discussed Windows 7, which will be going away soon.This month - Ransomware, which remains a threat. Find more on Blog at GrundigIT.comAs Always, Happy Computing! -- Tom Grundig Ransomware has a very literal name. Once it gets onto a computer, usually by downloading it by accident from an email or website, it will deny access to all data on the computer until a ransom is paid (even paying the ransom may not work). Prevention and Mitigation: CISA (Cybersecurity … [Read more...] about May Newsletter: Remote or Local Backup and Ransomware
November Newsletter: Computer Security
Last month, we talked about G Suite and its various features. This month's subject is Computer Security. We've covered it before, but computer security is ALWAYS important. As Always, Happy Computing! And Happy Thanksgiving! -- Tom Grundig Antivirus for Computer Security Even though it is not always perfect, having antivirus is important. Windows 8 and Windows 10 have Windows Defender preinstalled as part of the operating system. In almost every case, Windows … [Read more...] about November Newsletter: Computer Security
Firewalls: What, Why, How
Computers, laptops and other devices that connect to the Internet are vulnerable potential targets for a range of different threats. Firewalls are one defense to know about above all others, as a basic foundation of security. What is a firewall? Firewall is a term used to describe a barrier protecting something. Be it protecting a building from fire or a computer network from dangers, firewalls are barriers. In terms of computers, firewalls can either be software or hardware that monitors … [Read more...] about Firewalls: What, Why, How
Why Have Your Company’s Cybersecurity Evaluated
Experts estimate that the global market for cybersecurity products this year will exceed that of the last year. Cybersecurity is often an obscure or neglected area in organizations. Most companies put basic security defenses in place and then forget about it. Organizations scale or grow with time. So their IT setups and digital resources witness a lot of changes over time too. While these developments may boost your productivity, they open up your organization to newer and more complex risks. … [Read more...] about Why Have Your Company’s Cybersecurity Evaluated
Why Get a Security Assessment?
There are many specific reasons to get a security assessment: You’ve had a data breach There has been loss of memory or destruction of data A virus has infected your systems Or something else has obviously gone wrong But there is a very large and less pin-pointable reason that every business should have a periodic Network Security Assessment: because you aren’t sure your systems are secure. You hope so. And you think so. At some point in the past you knew that your … [Read more...] about Why Get a Security Assessment?
June Newsletter: Backup Technology
Last month, we discussed Computer Security This time: The latest in backup technology and services offered by companies like Datto. Find more on Blog at GrundigIT.com As Always, Happy Computing! -- Tom Grundig Network-driven Local and Cloud Backup Technology with Virtualization Network driven backups have been a thing for a while now, but a new wave has hit in the recent years. We feel we should discuss the differences between devices of the past, and the new age that has been passed … [Read more...] about June Newsletter: Backup Technology
May Newsletter: Business Computer Security
Greetings! Last month, we discussed Mac vs. PC This time: Computer Security Find more on Blog at GrundigIT.com As Always, Happy Computing! -- Tom Grundig Business Computer Security Computer security has been one of the most relevant and dynamic topics for a number of years. People are wondering how they can make their devices and networks more secure against cyber-threats. Let's talk about computer security practices that you should definitely consider to stay … [Read more...] about May Newsletter: Business Computer Security
October Newsletter: Beyond Passwords
Greetings! Last month, we we covered password security and what you need to know about it. This month, we go beyond passwords and examine the latest technology to solve some of the problems associated with passwords. This stuff is evolving fast and merits some attention. Next month, get ready for an overview of the improved Google Calendar as well as Google Backup and Sync (for consumers) and Google Filestream (for enterprises). Find more on Blog at GrundigIT.com As … [Read more...] about October Newsletter: Beyond Passwords
Ransomware – What you need to know.
No one ever thinks anything bad will happen to them, until it does. For computer users, one of the worst PC-related problems that can happen is to lose their data: documents, financial information, client information, photos, etc. Not only do individuals need to worry about the accidental deletion of their data, now people run the risk of a cybercriminal rendering their files inaccessible, then demanding payment in order to get their data back. This expanding threat to your precious data is … [Read more...] about Ransomware – What you need to know.
