When Employee Termination Goes Wrong

When Employee Termination Goes Wrong
This week a man in Arlington, TN – just around the corner from me in Memphis – was sentenced to 18 months in prison with two years of supervised release for accessing his former employer’s computer system, pilfering competitive information for his new employer.  Court documents showed he accessed a compromised email account that allowed ...

Security Controls 101 – What You Don’t Know CAN Hurt You; Inventory Your Software

Security Controls 101 - What You Don’t Know CAN Hurt You; Inventory Your Software
In my last blog post I told you why it’s important to know what’s on your network and why it matters. But knowing what devices are connected isn’t enough. You have to know what’s on those devices. What software is installed? What version? What have your users installed that you don’t know about? Who cares? You ...

New Global Ransomware Attack

New Global Ransomware Attack
If you haven’t heard yet, there’s yet another global ransomware attack spreading around the globe. As of right now (1:40 pm CST) there doesn’t seem to be a consensus on what type of ransomware it is. Some are claiming it’s a modified version of the Petya ransomware strain, yet others are saying it’s a new ...

How To: Update Sun Java

How To: Update Sun Java
Like Adobe Flash Player, Sun’s Java development environment helps super-charge web pages and create applications for everything from copy machines to smart phones. But Java is like Flash in another way; it’s an incredibly bug-ridden security hole. It was once popular to install it “just in case” you needed it on your computer. But what ...

Pump Up Your Password, Part 2

Pump Up Your Password, Part 2
In Pump Up Your Password, Part 1, we talked about the benefits of moving from a complex password to a long password. One of the problems we discussed is that often when you come up with a great password, the temptation is for you to use it everywhere. But that would be like having one key ...

Easy Effective Disk Wiping Tools

Easy Effective Disk Wiping Tools
Why Wipe? For those security minded people, wiping or erasing a disk may not be so unusual, but for many others, that may not be the case. Wiping tools provide another level of data and privacy protection and when used effectively, destroying all drive data and any data remnants. When you purchase a new computer, what ...

VEEAM: A Free Robust And Easy To Use Backup Solution

VEEAM: A Free Robust And Easy To Use Backup Solution
Veeam Endpoint Backup FREE 1.5 If you follow our posts and podcasts, you know we are huge proponents for having and maintaining robust backup solutions. We still find small businesses that do not have such. One of the reasons given is that it is too expensive for small businesses to implement a sophisticated backup solution. Those that ...

Removing Malware—A Step By Step Guide For Microsoft Windows

Removing Malware—A Step By Step Guide For Microsoft Windows
Word Of Warning No matter how hard you work at securing your small office/SOHO network and computers—someone, somehow, somewhere will unknowingly allow malicious malware into the system. The chances of recovery are better if you have planned for this scenario and are prepared to respond quickly. This post serves at least two purposes, first helping ...

5 Security Blogs You Should Be Reading

Monday afternoon I sat in a security briefing full of IT professionals from around the city of Memphis. As the presenter discussed the topic at hand, it was obvious that many of the participants didn’t have any idea what was being discussed. The few questions posed told me that folks aren’t keeping up with what’s going on ...

A Surprising Ransomware Statistic

Update (August 18, 2016). We just assisted a company with a ransomware attack. Check out our “Lessons Learned“. Security Magazine recently reported that 40% of businesses had experienced a ransomware attack in the last 12 months. Even worse is the fact that a third of those businesses lost revenue, and 20% experienced a complete business ...