Easy Effective Disk Wiping Tools

Easy Effective Disk Wiping Tools
Why Wipe? For those security minded people, wiping or erasing a disk may not be so unusual, but for many others, that may not be the case. Wiping tools provide another level of data and privacy protection and when used effectively, destroying all drive data and any data remnants. When you purchase a new computer, what ...

30: IDS Is Not Dead

30: IDS Is Not Dead
An IDS is one of the most valuable tools we use to secure small business networks. What is an IDS? Are they still useful? How can you use one in your business? We’ll answer these questions in this episode of the Tech Tip Podcast. Links Security Onion Web Site (From the web site) Security Onion ...

Product Review: Buffalo TeraStation 3400 NAS

Product Review: Buffalo TeraStation 3400 NAS
There are a lot of capable little NAS storage devices out there from vendors like Synology and QNAP, but we’ve come to rely on the Buffalo TeraStation, especially the 3400 series, at our small business client sites. What is a NAS? First of all, for those of you who may not know, a NAS is ...

Top 5 Types of Security Apps for the iPhone and Android

Top 5 Types of Security Apps for the iPhone and Android
Worried About Mobile Security? The security concern shown by most people, when it comes to their computers, is often lacking with mobile devices. Why is that? Most likely the reason is these devices were “phones” first that transitioned to portable computers. Today, mobile devices are ubiquitous. They often take the place of computers.  Mobile security must ...

Pump Up Your Password, Part I

Pump Up Your Password, Part I
When I was a kid, my grandparents lived in an old house that used skeleton keys. Even if a door had a different key from the others, I found that with a little luck, and sometimes a metal file, the keys were interchangeable. The locks and keys were so poorly made that they were almost ...

VEEAM: A Free Robust And Easy To Use Backup Solution

VEEAM: A Free Robust And Easy To Use Backup Solution
Veeam Endpoint Backup FREE 1.5 If you follow our posts and podcasts, you know we are huge proponents for having and maintaining robust backup solutions. We still find small businesses that do not have such. One of the reasons given is that it is too expensive for small businesses to implement a sophisticated backup solution. Those that ...

Rogue Thumb Drives—An Imminent Malware Threat

Rogue Thumb Drives—An Imminent Malware Threat
Don’t Plug It In! Human nature, being what it is, suggests that a newly “discovered” thumb drive will get plugged in, whether it is known to be safe or not. Curiosity usually wins in situations like this. When this happens, however, it creates a perfect environment for malware exploitation.  Cases in point: Harmful USB Drives ...

Why You Should Care About The Yahoo Breach

Why You Should Care About The Yahoo Breach
Background Last week Yahoo announced that the details of 500 million accounts had been stolen by a “state sponsored actor” at the end of 2014. (“State sponsored” means an entity – an individual, group, or company – whose services were paid for by a government. These days it’s fashionable to blame Russia or China, but ...

Take Along Security—A Portable Firewall And VPN Server

Take Along Security—A Portable Firewall And VPN Server
Scenario Today you need a break from the office and decide to grab your laptop and head to the local coffee shop. Internet connectivity is readily available there via public wi-fi, and you can work as if you are sitting at your office desk. After grabbing a fresh cup of brew, you open your laptop, ...

Product Review: Ubiquiti EdgeRouter X

Product Review: Ubiquiti EdgeRouter X
A solid SOHO router at a great price Ubiquiti’s EdgeRouter X is an amazing little box for the price. Out of the box, it looks like a standard SOHO 5-port switch. It’s tiny: 5.7 x 4 x 2.2 inches and only weighs 12 ounces. Underneath the hood, however, it’s a powerful router. Instead of the standard ...