Hackers are using the familiar Apple settings icon to trick users into hacking their own iOS devices. As I discussed in a previous post, this can permanently destroy your device. If you ever see the settings icon and a request to install, confirm or cancel, do not click any response presented. Rather, you should immediately close your app.… Read More »
The U.S. Postal Service just fixed a security weakness that allowed anyone who has an account at usps.com to view account details for some 60 million other users, and in some cases to modify account details on their behalf. This would have been less of an issue before they released their latest service called Informed Delivery, which allows users… Read More »
The Internet Crime Complaint Center received an increase in the number of Business complaints requesting false requests to purchase gift cards. The victims receive either a spoofed email, a spoofed phone call or a spoofed text from a person in authority requesting the victim purchase multiple gift cards for personal or business reasons.
Did you know that you can use Newforma to share folders on the network with outside vendors and clients? Shared folders create an online space where internal and external team members can access and share project files. This has a number of advantages over products such as Dropbox (which is a violation of some client contracts). Key features … Read More »
Office has a new look if you are on Office 365. One advantage that Office 365 offers is real-time access to the ever growing list of features that the product receives on an ongoing basis. Microsoft has also released its on-premise version of Office 2019
Freezing your credit is the best way to prevent identity theft. When your credit is frozen, no business can check it, and therefore will not allow new accounts to be opened in your name. When you need to open a new account, buy a car or home you can unfreeze your credit for a specified period of time… Read More »
If you were one of the 143 million Americans that had their data compromised in the September 2017 Equifax breach you will want to read on. According to the FBI, thieves that steal personal data park the information until it can be used with the greatest likelihood of success. Then they sell it, and you become a victim… Read More »
Apple released the latest OS for the Mac platform. It has a new look and some great new features including group FaceTime. Be sure to run a full backup before upgrading. Install Mojave from the App Store If you have already installed this update you can get more training here.
Attackers exploited a vulnerability in Facebook’s code that impacted “View As” a feature that lets people see what their own profile looks like to someone else. This allowed them to steal Facebook access tokens which they could then use to take over people’s accounts.
The next iOS update is here. So far it is stable and we have seen no issues with email or communications. If you like to play it safe give it a few weeks before you upgrade. Read about all the new features.
The next generation of cellular known as 5G is being rolled out on October 1. It will be available in four cities, but not in Chicago, so don’t worry your new iPhone is not obsolete just yet.
Remote administration tools, such as Remote Desktop Protocol (RDP), as an attack vector has been on the rise since mid-late 2016 with the rise of dark markets selling RDP Access. Malicious cyber actors have developed methods of identifying and exploiting vulnerable RDP sessions over the Internet to compromise identities, steal login credentials, and ransom other sensitive information.
The FBI is encouraging public awareness of cyber threat concerns related to K-12 students. The US school systems’ rapid growth of education technologies (EdTech) and widespread collection of student data could have privacy and safety implications if compromised or exploited. EdTech can provide services for adaptive, personalized learning experiences, and unique opportunities for student collaboration. Additionally, administrative platforms… Read More »
iPhone X S & iPhone X S Max – Compare models Improvements Faster Processor Better Camera Water Proof to 2 Meters Dual Phone Number Support 1.5 hr. Longer battery life on Max
OneNote is a virtual notebook, with incredible search capabilities, that synchronizes across all your devices and between multiple users in real time. A universal platform, it works on Windows, Mac, iOS, Android, and Online. Everything is stored as a separate element so markups can be removed, files or images can be saved or moved. Pages are a limitless… Read More »
Did you know you can use your iPhone, or iPad with cellular service, as a backup internet connection. Here is how to set it up: Install iTunes (Before your service goes down) Connect your iPhone to the PC via your charging cable Turn on Personal Hotspot After a few moments your PC will see the iPhone as a… Read More »
You can set your out of office from your iPhone as follows: Go to Settings > Accounts & Passwords > Choose Your work account At the bottom of the page tap Automatic Reply Be sure to set both the internal and external (scroll down) message. When you set an end date the message text will be updated with… Read More »
The Internet Crime Complaint Center (IC3) has recently received an increase in reports about extortion attempts received via e-mail and postal mail and using specific user information to add authenticity. While there are many variations in these extortion attempts, they often share certain commonalties.
Today the greatest threat to company security is the email vector. KnowBe4 provides security awareness training and simulated phishing attacks to test employee response to manage the continuing problem of social engineering.
Did you know that prices on Amazon change hourly. CamelCamelCamel.com tracks prices and can send alerts when they are at their lowest. Browser Plug-ins help simplify the service.
Based on new reporting, the Internet Crime Complaint Center (IC3) is providing updated guidance regarding technical support fraud. Tech Support Fraud involves a criminal claiming to provide customer, security, or technical support in an effort to defraud unwitting individuals. This type of fraud continues to be a problematic and widespread scam. In 2017, the IC3 received approximately 11,000… Read More »
There are a multitude of services that are built specifically for storing your passwords. I’d like to briefly delve into why it is foolish to use any of them. First of all, there are specific instances of these sites being hacked, for obvious reasons. If you store all the gold in one bank, that’s where the robbers are… Read More »
When you iPhone is not performing normally a hard reset may help: Press and quickly release the Volume Up button Press and quickly release the Volume Down button Press the Side button, and hold until the display suddenly goes dark (10 seconds).
Sketchup Make is a free version of SketchUp, however, the license is not for commercial use. Employees of our clients will often unknowingly request that we install software that has similar limitations. These requests are not intended to do harm, but they can be costly.
Common Internet of Things Devices May Expose Consumers to Cyber Exploitation In conjunction with National Cyber Security Awareness Month, the FBI is re-iterating the growing concern of cyber criminals targeting unsecure Internet of Things (IoT) devices. The number of IoT devices in use is expected to increase from 5 billion in 2016 to an estimated 20 to 50… Read More »
1) Open the email from your accounting department and click on the link that looks like: https://something/deltektouch/ajera/expense/ajerashared/backend/ajeraurl.php Click ok if you see this error 2) Click Open 3) Install the App 4) Open the App & accept terms (at the bottom) 5) When you get here, stop. Go back to the email with the link and click on… Read More »
When a user has the preview pane turned on in Windows Explorer, they cannot rename or move files. This is because, unlike the thumbnails generated for photos, the OS does not release the current file after opening it and generating the image. The OS then falsely reports that the file is locked by someone for editing. The worst… Read More »
Consumer Notice: Internet-Connected Toys Could Present Privacy and Contact Concerns for Children The FBI encourages consumers to consider cyber security prior to introducing smart, interactive, internet-connected toys into their homes or trusted environments. Smart toys and entertainment devices for children are increasingly incorporating technologies that learn
There is an extremely nasty hack that will brick your iOS device if you let it in. It installs itself as a Profile on your device. In one particular instance, we discovered the Profile was named “Emergency Alerts” and had been allowed by the user clicking on a popup link that indicated these would help in the case… Read More »
Business E-mail Compromise E-mail Account Compromise The 5 Billion Dollar Scam This Public Service Announcement (PSA) is an update to Business E-mail Compromise (BEC) PSAs 1-012215-PSA, 1-082715a-PSA and I-061416-PSA, all of which are posted on www.ic3.gov. This PSA includes new Internet Crime Complaint Center (IC3) complaint information and updated statistical data as of December 31, 2016. DEFINITION Business… Read More »
This app allows users to digitally preview the exterior of inbound mail and track packages sent in the past week. Records are not created until you signup for the service, which requires detailed information about your finances for verification. Download from iTunes
The grid below illustrates the comparison between cumulative costs over time between Office 365 (cloud solution) and on-premise Exchange. In this example, we have assumed 15 users- 5 with unlimited mailboxes at $8 per user per month, 10 with 50GB mailboxes at $4 per user per month, and cloud mailbox backup for each user at $1.50 per month.… Read More »
When sending images from your iPhone you can choose whether they are sent as attachments or embedded in the message. This is determined by the format of the email itself. If the email format is text the photos will be sent as attachments if the email is HTML the images will be embedded. Nowhere in settings can the… Read More »
Keeping your family safe on the Internet is a moving target. The Internet brings technology into our lives, but like the Gutenberg Press, its original purpose has been corrupted. If left unchecked, it will influence the very character of your children. To this end, I have a number of technologies and insights that can aid you in protecting… Read More »
Passwords should never be stored in clear text, Excel or in the cloud. These are easy targets for viruses and hackers. There is a open source program called KeePass that will store your passwords in an encrypted file on your Mac or PC. A pin or password is used to access your data. You can also load this… Read More »
Covenant Eyes – Is a web browser and service that filters content and reports internet activity for $14 a month per family. The interesting twist is that you can leave filtering off and just rely on the reporting. This was helpful in the instance where a high school filter blocked Circle and the school expected unrestricted access to… Read More »