Blog

How To Protect Yourself From a Future Email Attack

This is Part 3 in our series on email hacking Whether you’ve been hacked or not, everyone can take stronger efforts to protect their accounts. In the modern age, it’s no longer if you get hacked – it’s when. There are measures you can take, however to make it more difficult for hackers to gain control of your accounts. Follow these steps to keep your data and identity safe online. Use Secure Passwords Change your passwords on all accounts frequently, and they need to be strong, with at least 12 [...]

By |2018-06-26T18:23:34+00:00June 26th, 2018|Blog|Comments Off on How To Protect Yourself From a Future Email Attack

What to do if your email gets hacked

Now that you’ve determined if your email has been hacked, what do you do? You definitely shouldn’t ignore it. You don’t have to be a celebrity to have valuable information in your email that hackers want. They aren’t looking for gossip – they want your data. Some will keep passwords or logins to government departments or large companies they may want to ’target’ to hack them. But the more sophisticated ones will sell your details including name, telephone, email address, and credit card details and cash in on The Dark [...]

By |2018-06-18T20:17:16+00:00June 12th, 2018|Blog|Comments Off on What to do if your email gets hacked

How to See if Your Email Has Been Hacked

Whether it’s a personal email or a business account, getting your email hacked is a scary possibility. Hackers can quickly gain access to anything you’ve sent – like passwords, account numbers, or bank information – plus, they could use your account to send viruses to other computers, and then hack them. In this three-part series, we discuss how to determine if you’ve been hacked, how to report the hackers and get them out of your accounts, and finally, how to protect against them in the future. To start, how do [...]

By |2018-05-22T15:26:33+00:00May 22nd, 2018|Blog|Comments Off on How to See if Your Email Has Been Hacked

3 Tips to Make Your Backup Ransomware Ready

While all this may look like a lot of bad news, the upside is that there are some quick tweaks you can make to your backup strategy that will make it more effective against ransomware. Embrace 3-2-1 backup: 3-2-1 backup is a backup strategy that requires you to have three copies of your data in two different locations, one of which is offsite. Making your backup 3-2-1 compliant ensures that even if one copy of your backup is encrypted by ransomware you’ll still have at least one off-site copy that can’t be [...]

By |2018-04-26T20:56:35+00:00April 24th, 2018|Blog|Comments Off on 3 Tips to Make Your Backup Ransomware Ready

Using Backup to Recover from Ransomware: 4 Things You Must Consider

While it’s true that restoring from backup is the best option when you’re hit with a ransomware attack there are several things to think about when you use backup as the core of your ransomware protection strategy. Recovery point objective (RPO): Recovery Point Objective is the timeframe dictating how often backups are created. It also informs the dates and times you can recover from. If you take weekly backups and you suffer data loss you can restore that computer exactly as it was a week ago. If you take daily backups and [...]

By |2018-04-26T20:57:20+00:00April 17th, 2018|Blog|Comments Off on Using Backup to Recover from Ransomware: 4 Things You Must Consider

Part 1 – Just because you have a backup…

When faced with a ransomware attack the current wisdom is if your computer gets infected and it encrypts your files you have three basic options: Pay the ransom Restore from a backup Cut your losses and nuke the computer Of those three choices, backup is obviously your best option. Assuming everything goes well, you’ll get your data back and you can get back to work knowing you dodged a bullet. But remember, just because you have backup in place doesn’t mean you’re protected from ransomware. Recently, members of the Spiceworks [...]

By |2018-04-26T20:57:43+00:00March 30th, 2018|Blog|Comments Off on Part 1 – Just because you have a backup…

Google Can Still Track You With Location Services Disabled

Google recently found itself in a bit of hot water after an investigation by Quartz revealed that the company was intrusively collecting location data on literally every Android device in use today. That's billions of devices all over the globe. There are many instances when there's an expectation that location data can and will be tracked. In fact, one of the most commonly used features of smartphones in general (GPS and directions) demands it. After all, Google Maps can't tell you how to get where you're going if it doesn't [...]

By |2018-04-18T18:21:27+00:00December 4th, 2017|Blog|Comments Off on Google Can Still Track You With Location Services Disabled

Epson Printer Having Issues? It Could Be A Microsoft Update

Do you have an older Epson printer that suddenly stopped working? If so, it may not be the printer at all, but a recent Windows update that lies at the heart of the issue. German engineer Gunter Born tracked the problem to the following Microsoft Patches: KB4048953 for Windows 10, Ver. 1607 KB4048954 for Windows 10, Ver. 1703 KB4048955 for Windows 10, Ver. 1709 KB4048957 for Windows Server 2012, R2 KB4048958 for Windows 8.1 KB4048959 for Windows Server 2012 And KB4048960 for Windows 7, Service Pack 1 These recent updates [...]

By |2018-04-18T18:21:39+00:00December 2nd, 2017|Blog|Comments Off on Epson Printer Having Issues? It Could Be A Microsoft Update

More Bad News For OnePlus Phone Users

OnePlus phones have been getting plenty of bad press lately, thanks to malicious apps found to be factory-installed on a percentage of the devices, along with some intrusive data collection features the manufacturer has installed. As it turns out, though, the story gets worse. Recently, a security researcher going by the alias "Elliot Alderson" discovered a factory-installed application called "Engineering Mode" that can perform a series of intrusive hardware diagnostic routines, and can even be used to root the device. What's worse is that security flaws in the app make [...]

By |2018-04-18T18:21:51+00:00December 1st, 2017|Blog|Comments Off on More Bad News For OnePlus Phone Users