Security Concerns with LastPass

Posted by - January 05, 2023

In general, it’s a good thing to be using a password manager to generate a strong, unique password and to keep track of all of your passwords. For many of OptfinITy’s clients, the password manager that has been used has been LastPass – something we ourselves have been using since 2013. Over the past 6… Read more »

How Changes to the Microsoft Donation Program will Affect You

Posted by - March 17, 2022

If you’re like many non-profits, you may benefit from the Microsoft Non-profit program. This endeavor has enabled nearly 400,000 organizations worldwide to access top-notch technology at discounted rates.  However, there are going to be some major changes to the software donation program that will take place on April 4, 2022 that you should be aware… Read more »

Healthcare’s Struggle with Cybersecurity

Posted by - August 20, 2021

The healthcare industry has become more important than ever during the coronavirus pandemic, as the majority of Americans have had to interact with a provider in order to get a coronavirus vaccine, test, or care.  This has resulted in an influx of personal medical information to these institutions. That coincided with a global increase in… Read more »

What is V2X Technology?

Posted by - August 10, 2021

Self-driving cars have become an iconic part of the early 21st century.  Tech companies like Uber, Google, and Apple have all made forays into self-driving vehicles to media fanfare.  Self-driving car company Tesla has a legion of devoted fans, partially due to CEO Elon Musk’s purposeful cultivation of that base, and the stock price to… Read more »

Insurance Giant Struck by Ransomware Attack

Posted by - June 30, 2021

The Rise in Cybercrime and Cyber Insurance Over the past year, we have profiled major cyberattacks to raise awareness about the surge in cybercrime after 2020. Businesses continue to struggle with balancing remote work and the need for stronger security measures. Some companies, unwilling or unable to invest in structural security improvements, choose to take… Read more »

Cyber Resilience and Data – Centric Security

Posted by - June 20, 2021

2020 shifted the business world’s mindset on a lot of important issues.  Policies about time off, remote work, sick policies, and office communication have all adapted in response to the pressures of the coronavirus pandemic. However, the dramatic global increase in cybercrime, especially ransomware attacks, have created a new pressure on businesses to adapt their… Read more »

5 Common Digital Threat Misconceptions

Posted by - June 10, 2021

With the increase in digital threats and cyber attacks over the past two years, experts are recommending for organizations to take another look at their security protocols.  However, some people are falling prey to common misconceptions about digital threats and cybersecurity and leaving their organization vulnerable as a result.  Here are 5 of the most… Read more »

An Update Turned This App Into Malware. Were You Affected?

Posted by - May 20, 2021

Popular Barcode Scanner App Turns Malicious, Affects Millions A once-trusted barcode and QR code scanner app has turned on its users, compromising nearly 10 million devices. Lavabird Ltd’s Barcode Scanner gained popularity on the Google Play Store as a go-to solution for Android users. Unlike Apple’s newer devices, Android phones don’t come with built-in QR… Read more »

Add Me as an Admin: A 5-Word IT Horror Story

Posted by - April 30, 2021

Why Can’t I Be the Admin of My Own Computer? Everyone who works in IT dreads hearing this question. Admin privileges provide powerful access, enabling major system changes like editing files and downloading software. Calling your IT provider just to type in a passcode can feel frustrating. If your job involves frequent software downloads, it’s… Read more »

Data Leakage Attacks are Here to Stay

Posted by - March 20, 2021

What does a cyberattack look like? There’s no specific technique, target, or goal to unite them.  They can be part of an anti-terrorism campaign, like the United States’ Stuxnet attack on Iranian nuclear refineries.  They can be motivated by financial gain, like the recent trend of ransomware attacks that demand payment in Bitcoin before unlocking… Read more »