If a cyber security professional would tell you not to implement a critical security update on your servers or endpoints you might look at them quizzically.… Read More
Author: Mitch Zahler
Office Depot Caught and Fined for Allegedly Rigging PC Malware Scans
The FTC on Wednesday announced that Office Depot agreed to pay a total of $35 million to settle Federal Trade Commission allegations that the companies tricked customers into buying millions of dollars’ worth of computer repair and technical services by deceptively claiming their software had found malware symptoms on the customers’ computers.… Read More
Increasing Cyber Security AFTER a Breach
It happens almost every day. Small to Medium sized Business’s (SMB) discover breaches and besides paying for remediation and notification to their clients, they also start improving their security.… Read More
I want to enter the cyber security workforce but I’m not sure where to start
I am constantly being asked by my students and other people looking to get into the cyber security workforce where they should start and what discipline they should go in to.… Read More
Volunteer your services, not your personal information
Learn anything from the DNC and other recent hacks ? Maybe you should have
As I talk to clients and others, I am struck by the lack of connection each one of them thinks they have to the recent hacks that have occurred to the DNC, Democrat staffers and other information constantly being released by hackers.… Read More
Is your car the next victim of a cyber hack ?
I’ve written articles about how cyber security is an afterthought of many of the products we use today which rely on some sort of security.… Read More
So you have been infected with Ransomware
Follow these steps to prevent further spread of ransomware on your system:
Disconnect infected system(s) to prevent further spread of malware Call your technical support staff immediately so they can determine what variant of ransomware you may have and take appropriate next stepsIf you don’t have technical support available or they are not versed in ransomware procedures please follow below:
System administrator should temporarily revoke your system network access rights to all shares Determine how large the infection is Determine what strain of ransomware infected machine Based on your findings, take the next steps in restoring data Remove ransomware from your infected systemHopefully you made backups of your data (if you didn’t it’s time to pay up and hope)
Restore Your Files From Backup
Locate your backups a.… Read MoreCyber Protection Steps For Smaller Buisnesses
Many smaller businesses I’ve spoken to over the last year don’t think Cyber Security is something they need to worry about until they call to say they may have had a breach and need help.… Read More
If you have a LinkedIn account should you change all your passwords ?
Those of us who have accounts on LinkedIn and received a breach notification, should you be changing passwords on your other systems if you used the same password as on LinkedIn ?… Read More