Security

How to stay secure and protect your data at work, home, and on the Internet.

Phone-Based Scams are Evolving

Phone scams have always been a problem, and the techniques used are evolving. I recently received a scam call that...

Read more

Protect Your Devices Against WiFi Vulnerabilities

Reports of a recently discovered WiFi vulnerability have been all over the Internet. It’s nearly impossible to log in to...

Read more

Good Policy before Security.

I’d like to posit that a truly secure environment is difficult but not impossible. The primary requirement is not a...

Read more

MFA on Office365: a Basic Primer

In my previous article, I went through some of the high-level reasons why you should (need!) to deploy MFA (Multi-Factor...

Read more

Multi Factor Authentication

MFA? Master of Fine Arts… Unfortunately, there is nothing artistic about MFA, besides the histrionics caused by not using it...

Read more

Social Engineering: How to Spot Common Phishing Attacks

Social engineering, the exploitation of human psychology, is nothing new; from the Trojan Horse to today’s 419 email scams, conmen...

Read more