New Global Ransomware Attack

New Global Ransomware Attack
If you haven’t heard yet, there’s yet another global ransomware attack spreading around the globe. As of right now (1:40 pm CST) there doesn’t seem to be a consensus on what type of ransomware it is. Some are claiming it’s a modified version of the Petya ransomware strain, yet others are saying it’s a new ...

How To: Update Sun Java

How To: Update Sun Java
Like Adobe Flash Player, Sun’s Java development environment helps super-charge web pages and create applications for everything from copy machines to smart phones. But Java is like Flash in another way; it’s an incredibly bug-ridden security hole. It was once popular to install it “just in case” you needed it on your computer. But what ...

Pump Up Your Password, Part 2

Pump Up Your Password, Part 2
In Pump Up Your Password, Part 1, we talked about the benefits of moving from a complex password to a long password. One of the problems we discussed is that often when you come up with a great password, the temptation is for you to use it everywhere. But that would be like having one key ...

Easy Effective Disk Wiping Tools

Easy Effective Disk Wiping Tools
Why Wipe? For those security minded people, wiping or erasing a disk may not be so unusual, but for many others, that may not be the case. Wiping tools provide another level of data and privacy protection and when used effectively, destroying all drive data and any data remnants. When you purchase a new computer, what ...

VEEAM: A Free Robust And Easy To Use Backup Solution

VEEAM: A Free Robust And Easy To Use Backup Solution
Veeam Endpoint Backup FREE 1.5 If you follow our posts and podcasts, you know we are huge proponents for having and maintaining robust backup solutions. We still find small businesses that do not have such. One of the reasons given is that it is too expensive for small businesses to implement a sophisticated backup solution. Those that ...

Removing Malware—A Step By Step Guide For Microsoft Windows

Removing Malware—A Step By Step Guide For Microsoft Windows
Word Of Warning No matter how hard you work at securing your small office/SOHO network and computers—someone, somehow, somewhere will unknowingly allow malicious malware into the system. The chances of recovery are better if you have planned for this scenario and are prepared to respond quickly. This post serves at least two purposes, first helping ...

5 Security Blogs You Should Be Reading

Monday afternoon I sat in a security briefing full of IT professionals from around the city of Memphis. As the presenter discussed the topic at hand, it was obvious that many of the participants didn’t have any idea what was being discussed. The few questions posed told me that folks aren’t keeping up with what’s going on ...

A Surprising Ransomware Statistic

Update (August 18, 2016). We just assisted a company with a ransomware attack. Check out our “Lessons Learned“. Security Magazine recently reported that 40% of businesses had experienced a ransomware attack in the last 12 months. Even worse is the fact that a third of those businesses lost revenue, and 20% experienced a complete business ...

25: Lock Up Your Docs

25: Lock Up Your Docs
Do you keep sensitive information in Microsoft Word, Excel or PowerPoint docs? What about Adobe PDFs or AutoCAD files? If so, then you probably need to encrypt those documents. This week we’ll talk about when you should consider encryption for your documents, and cover some tools and techniques for easily and cheaply encrypting your files. ...

Tech Tip Podcast Episode 17: Return of Ransomware!

Tech Tip Podcast Episode 17: Return of Ransomware!
Ransomware is back in the news, so it’s back on the podcast. This week, however, we’ll show you how to keep from getting infected through good ‘ole Microsoft Office. Download episode transcript Subscribe on iTunes Listen on Stitcher David Scott Network ninja, dad, husband, rugby player. I help you secure your digital stuff. http://www.shoestringnetworks.com/david-scott/