WordPress Updates are No Longer Automatic

Posted by - February 08, 2018

Making sure your website is updated with the latest patches is very important as new vulnerabilities are discovered almost daily – so what happens when the latest update stops your updates from working? On Monday, WordPress released version 4.9.3. The very next day, WordPress released version 4.9.4. Although version 4.9.3 fixed 34 bugs, it also… Read more »

Spectre? Meltdown? Should you throw out your computers?

Posted by - January 05, 2018

Meltdown and Spectre are the latest named vulnerabilities to appear in the news and they are in fact very problematic because the attacks could be used to read system memory that *should* have been inaccessible. What happens is an attacker could steal sensitive information such as passwords or encryption keys from your computer’s memory. And… Read more »

Your Next Password May Be Stored in Your Shirt Cuff

Posted by - December 21, 2017

  Researchers at the University of Washington are trying to store small amounts of data on smart fabrics.  These magnetized garments would be readable by a magnetometer and not need any electronics or batteries to function.  This would be useful for invisibly labeling items or using clothing or accessories in place of a password or… Read more »

The Holiday Season Is Scammer Heaven

Posted by - November 16, 2017

  It’s the Holiday Season once again, but remember it is also a holiday for the bad guys as well, but not in the way you might think. Hackers go into scam-overdrive mode during this time of the year to prey on the heavy shopping done by consumers. This time of year is the busiest… Read more »

iPhone “i” Problem Solution

Posted by - November 09, 2017

If you have an iPhone and you’re having the issue where “i” gets replaced with weird characters, here is the fix: Go to Settings Go to General Go to Keyboard Go to Text Replacement Tap + in the top right corner Type lower case i on the phrase line & capital I on the shortcut… Read more »

What is the KRACK Attack and Are You Safe?

Posted by - October 18, 2017

Most of us have been using wireless networks (Wi-fi) daily for years, but you may not know that every one of your wireless devices is currently at risk of being hijacked. Wireless networks previously used a protocol known as WEP, which was insecure, resulting in the creation of WPA2. WPA2 was supposed to protect networks… Read more »

Why you Should Consider VoIP

Posted by - October 06, 2017

Voice over Internet Protocol, more often referred to as VoIP or Voice over IP is a technology that utilizes your internet connection to make and receive phone calls. VoIP is a popular technology option among small to medium sized business to replace their traditional phone system or landlines since it provides more features and cost… Read more »

Want to improve cybersecurity? Try phishing your own employees

Posted by - September 28, 2017

Spear phishing campaigns make up 90% of cyberattacks and most employees are still unable to discern these scams from innocent emails. If you want to improve your company’s cybersecurity education, you might want to consider phishing your own staff. Before making the campaign public, companies should take a baseline measurement of how employees react to… Read more »

5 Awesome Windows® Features You Never Knew Existed

Posted by - September 27, 2017

1. Window Shake and Shrink If you’ve ever worked within multiple Microsoft® windows, you know that bouncing back and forth between them can be a pain. To fix this, click on and hold the title bar of a program and give it a little shake with your mouse. All other windows will minimize, and the… Read more »