Cyber Security News, Tips, & Tricks
James Veitch is the Scam Email Superhero We Need
For 3 years James Veitch has been responding to scam emails. Why? He’s certainly notRead more.
Twitter hits back again at claims that its employees monitor direct messages
Twitter is pushing back against claims made by conservative activist group Project Veritas that itsRead more.
How To Connect to Dropbox Over FTP
Connecting to Dropbox over FTP or FTPS isn’t supported natively. This post will give youRead more.
2017 Was The Year Of Hacks. 2018 Probably Won’t Be Better.
Remembering Equifax, Uber and all the other data breaches of the last year.Read more.
Crunch Report | South Korea Announces New Cryptocurrency Regulations
South Korea announces new cryptocurrency regulations coinciding with the drop in bitcoin prices, YouTube getsRead more.
Manage Multiple WordPress Sites with UpdraftCentral
In my most recent post, I talked about one of the most underrated plugins forRead more.
The Most Underrated Plugin for WordPress Backups
I recently began looking for a good backup option for my WordPress sites. In the past,Read more.
Why You Should Switch Your Site to HTTPS
For the non-technical website owner, switching your site from http to https may seem likeRead more.
Privilege Creep: Prevention & Correction
By sheer definition, privilege creep is the gradual accumulation of access rights beyond what anRead more.
Equifax Data Breach – Free Protection: Huge Price
By now everyone has heard about the massive Equifax data breach. Not only were 143Read more.
Prankster Tricks White House Officials via Email Phishing
Americans in the land’s highest office apparently have the tech skills of our grandparents. WhenRead more.
Dealing With Clients Who Don’t Get Cyber Security
This post is also available without ads as an eBook at the CGS Computers CyberRead more.
Adobe Flash: A Broken Lock No One Wants to Replace
Adobe Flash Player is a security nightmare, plain and simple. Unfortunately, many large companies stillRead more.
Hacking an Internet-Less PC With Its HDD LED
At first thought, it might seem impossible to pull data from a computer that’s notRead more.
Separation of Duties: Implementation & Challenges in IT
The concept of Separation of Duties (also known as Segregation of Duties) applies to many differentRead more.
Data Center Redundancy: The Basics of Availability
Redundancy, as it relates to the data center, is a relatively simple concept; resources areRead more.
The Internet of Things (IoT): Changing Cyber Security
The Internet of Things and all of it’s ‘Things’ The Internet of Things is theRead more.
File Sharing on Windows: Best Practices for the Enterprise – Security
Windows file sharing is the quickest way to make data available to many users atRead more.
How To Protect Your Data From The NSA
Domestic Agencies Such as The NSA Have Been Spying on Everyone for Decades We allRead more.
Security Breach at Home Depot: A Symptom of a Larger Problem in Corporate America
The Largest Data Breach in Retail History By now, just about everyone has heard aboutRead more.
“I Was Hacked!” – No, You Were Just Stupid
Media Coverage About Hacking As a person who reads about technology news and events, IRead more.
Five Easy Ways to Keep Your Data Backed Up
The Disaster If Benjamin Franklin had been alive during the digital age, his famous letterRead more.
Why Security Questions Aren’t So Secure
Forgot Your Password? No Problem, Just Answer These Security Questions to Reset it… One ofRead more.
Two Ways to Make Unforgettable Complex Passwords
“Never Write Down Your Passwords” We hear this at work, on the internet, from ourRead more.
Targeted Ads on… Everything
How would you feel if one day, you could have a smart refrigerator with itsRead more.
Change Your eBay Password Now!
It seems like every few days now, we’re made aware of the latest cyberattack andRead more.