Cyber Security News, Tips, & Tricks
Privilege Creep: Prevention & Correction
By sheer definition, privilege creep is the gradual accumulation of access rights beyond what an individual needs to do theirRead more.
Equifax Data Breach – Free Protection: Huge Price
By now everyone has heard about the massive Equifax data breach. Not only were 143 million people (half the USRead more.
Prankster Tricks White House Officials via Email Phishing
Americans in the land’s highest office apparently have the tech skills of our grandparents. When White House staffers received emailsRead more.
Dealing With Clients Who Don’t Get Cyber Security
This post is also available without ads as an eBook at the CGS Computers Cyber Store Cyber Security is oneRead more.
Adobe Flash: A Broken Lock No One Wants to Replace
Adobe Flash Player is a security nightmare, plain and simple. Unfortunately, many large companies still use it on their websites.Read more.
The Feds Drop a Child Porn Case to Avoid Exposing a Tor Exploit
There’s something to be said when sacrifices are made for the greater good. At least that’s what the Department ofRead more.
One Million Yahoo and Gmail Account Passwords for Sale on the Dark Web
More than 1 million Yahoo and Gmail accounts – including usernames, email addresses and plain text passwords – are reportedlyRead more.
Hacking an Internet-Less PC With Its HDD LED
At first thought, it might seem impossible to pull data from a computer that’s not connected to the Internet. HowRead more.
Separation of Duties: Implementation & Challenges in IT
This article is also available as an eBook download on the CGS Computers Cyber Store The concept of Separation of DutiesRead more.
Data Center Redundancy: The Basics of Availability
Redundancy as it relates to the data center is a relatively simple concept; resources are duplicated in order to provideRead more.
The Internet of Things (IoT): Changing Cyber Security
The Internet of Things and all of it’s ‘Things’ The Internet of Things is the collection of physical devices connected toRead more.
File Sharing on Windows: Best Practices for the Enterprise – Security
Windows file sharing is the quickest way to make data available to many users at once. Setting it up isRead more.
How To Protect Your Data From The NSA
Domestic Agencies Such as The NSA Have Been Spying on Everyone for Decades We all knew it. Even before EdwardRead more.
Security Breach at Home Depot: A Symptom of a Larger Problem in Corporate America
The Largest Data Breach in Retail History By now, just about everyone has heard about the data breach at TheRead more.
“I Was Hacked!” – No, You Were Just Stupid
Media Coverage About Hacking As a person who reads about technology news and events, I see my share of storiesRead more.
Five Easy Ways to Keep Your Data Backed Up
The Disaster If Benjamin Franklin had been alive during the digital age, his famous letter to Jean-Baptiste Leroy would haveRead more.
Why Security Questions Aren’t So Secure
Forgot Your Password? No Problem, Just Answer These Security Questions to Reset it…Read more.
Two Ways to Make Unforgettable Complex Passwords
“Never Write Down Your Passwords” We hear this at work, on the internet, from our banking institutions, and basicallyRead more.
Targeted Ads on… Everything
How would you feel if one day, you could have a smart refrigerator with it’s own internet connection that youRead more.
Change Your eBay Password Now!
It seems like every few days now, we’re made aware of the latest cyberattack and have to go changeRead more.