The Hidden Risks of Public USB Charging Stations: Juice Jacking and How to Protect Yourself

Posted Posted in Apple, Best Practice, iPad, iPhone, Mobile General, Security

As a long-time user of Apple products, I’m well aware of the importance of keeping our beloved devices charged. Public USB charging stations in airports, hotels, and shopping centers have become a convenient solution for that purpose. However, the FBI Denver and the FCC have recently warned about a cyber-theft tactic called “Juice Jacking,” which […]

10 Critical Steps to Survive a Ransomware Attack

Posted Posted in Best Practice, Business, Business Continuity, Internet, Phishing, Ransomware, Scams, Security

We’re seeing a rash of ransomware sweeping across IT systems, ranging from large enterprises to microbusinesses with only a few PCs.¬†As I am writing this, we are in the middle of responding to an incident where a business has been entirely shut down due to being infected with the Locky ransomware. The entire business has […]

Time to remove Quicktime for Windows

Posted Posted in Apple, Best Practice, Windows

The US-CERT (Computer Emergency Readiness Team) (a division of the Department of Homeland Security) recently published an advisory to immediately ditch Apple’s QuickTime product on Windows systems. They cited a blog post from Trend Micro, which noted that Apple has dropped security updates for the product on Windows, and that there are known security holes […]

A Reminder About Administrative Rights

Posted Posted in Best Practice, Security

Years ago, we blogged about why having administrative rights over your computer is not the great thing that it sounds like. A recent study by Avecto underscores this point and reminds us why you don’t want them (all the time). The study states “Analysis of Microsoft Security Bulletins from 2013 highlights that 92% of Critical […]