IT Specialist Blogs

rss

News, Topics and Opinions on Information Technology

Fotolia_65570619_XS.jpg

Even if you have the best security on your computer network, you might have noticed that you still seem to get hacked…or worse. Ask Equifax. Why is this happening? It’s probably because a member of your staff has made it easy for cyber criminals to get inside. It’s really ...

Specify Alternate Text

A new study was just released by the National Association for Information Destruction. What did it find? Astonishingly, about 40% of all digital devices that are found on the second-hand market had personal information left on them. These include tablets, mobile phones, and hard drives. The market for second hand ...

Specify Alternate Text

Believe it or not, you just can’t shred too much. If you aren’t destroying your sensitive data, my best advice is for you to start now. There are people out there who make a living diving into dumpsters in search of credit card info, bank account number, mortgage statements, ...

Specify Alternate Text

Hi, I wanted to share with you a funny story….  My boss calls me into her office, very serious like.  She sits me down and asks “Did you use the company credit card without authorization?” I am very confused, although I have access, I would not order anything without asking.  I ...

Specify Alternate Text

There is a new strain of "ransomware" that does not  bother with the whole encryption thing at all.  These bad guys seem to think it's just an unnecessary distraction and too much work. Better to just start nuking files and then present victims with a ransom note.  It's called ...

Specify Alternate Text

There is a new ransomware strain called "Satana" (the reference is clear, just take the last "a" off) which is a blend between classic file encryption malware and the Petya strain which locks the Master Boot Record (MBR).  This looks like a Petya copycat, but for each encrypted file, Satana ...

Specify Alternate Text

You’ve probably read many times that two-factor authentication is a superb extra layer of protection against a thief hacking into your accounts, because gaining access requires entering a One Time Passcode (OTP)—sent via text or voice—into a login field. In other words, no phone, no access. But CAN a hacker ...

Specify Alternate Text

If the person you are sending an e-mail to pretty much instantaneously receives it, how on earth can you unsend or cancel it? Well, you have several options. Criptext This is a browser plug-in that works for Chrome and Safari. Your message including attachments ...

Specify Alternate Text

If you think there’s like a million apps out there, that’s not exactly an exaggeration. For sure, there are more than you can imagine, which makes it easy to conceive that many certainly come with security problems. In fact, out of the top 25 most popular apps, 18 of them ...

Specify Alternate Text

In this day and age, we should never hear someone proclaim, “Oh my God, my computer crashed! I lost everything!” You can’t lose something that’s been properly backed up. So many people, including ones with businesses that rely upon cyber communication, continue to avoid backing up their digital data. Nobody is ...

Interested in submitting content for publication and syndication on the IT Specialist Network?

As a contributing writer on the IT Specialist Network, you can quickly gain exposure as an opinion leader or subject matter expert in information technology by informing a large audience of technical professionals. We welcome new and established authors that specialize in one or more sectors of the IT industry. Once your article(s) is approved for publication, it will be selectively syndicated throughout the IT Specialist Network.

Click here to contact us.