URGENT! Google Chrome “HTTPS By Default D-Day” Is Today! (July 24, 2018)

URGENT! Google Chrome “HTTPS By Default D-Day” Is Today! (July 24, 2018)

Why the big hubbub over HTTPS?… Because from now on, users who visit HTTP sites will be hit with a BIG WARNING from Google. This will happen to anyone using Google Chrome version 68. Google warns that you should have been protecting your websites with HTTPS for a while now. And this isn’t just for…

August 2018 Ransomware Update

August 2018 Ransomware Update

The Newest Forms Of Ransomware & How To Protect Your Business From Them The Situation Ransomware is now one of the top security concerns for businesses and organizations of all sizes. The City of Atlanta was hit with a ransomware attack called SamSam in March, crippling some important departments like their court system, sewer infrastructure…

The 10 Most Secure & Insecure Airports For WiFi In The United States

The 10 Most Secure & Insecure Airports For WiFi In The United States

Is It Safe For Me To Use The Airport’s Public Wi-Fi When I Travel? Most airports around the U.S. and abroad provide free Wi-Fi service to travelers stranded in their terminals, waiting for their flights. While this service may appear to be generous, a recent study by Coronet, a cybersecurity company, suggests you might want…

Intel Chip Vulnerabilities: What We Know So Far!

Intel Chip Vulnerabilities: What We Know So Far!

What Do We Know About Terminal Fault (L1TF) Chip Vulnerabilities? Understanding The L1 Terminal Fault (L1TF) Intel has recently confirmed L1 Terminal Fault (L1TF) chip vulnerabilities in its processors that can be manipulated by malware and malevolent virtual machines with the intention of stealing private information from a computer’s memory. Who or What is Vulnerable?…

What Are PhishPoint Attacks And How Can I Best Protect Against Them?

What Are PhishPoint Attacks And How Can I Best Protect Against Them?

What’s PhishPoint? Phishing attacks are attempts to get e-mail recipients to provide sensitive information that can be used by the sender, generally presented as the authority of some account or business. They request that recipients provide information that could be misused for some type of illegal practical gain of the sender. An example of this…

Happy Labour Day Everyone!

Happy Labour Day Everyone!

Happy Labour Day (Labor Day – International Workers Day –  May Day)! You’ve worked hard all summer. This Labor Day before going back to work and back to school, take some time to relax and enjoy one more backyard barbeque, one more trip to the beach, one more night sleeping under the stars, one more…

Is Office 365 Worth It?

Is Office 365 Worth It?

A Look Inside a Company Who Has Successfully Made the Switch If you are self-employed or run a business, you more than likely use Microsoft Office in some or most of your day-to-day operations. If you haven’t made the switch to Microsoft Office 365, you have probably considered it or given it some thought. Maybe…