Dynamic Edge Author Archive
To pay or not to pay the ransom?
That has been a major hurdle for organizations across the US. Local governments, manufacturing, accounting, even hospitals—have all ended up concluding that paying the ransom was the only way to get their systems up and running.
This dilemma—the one in which you will have to make a serious decision about whether you pay criminals to give back your data or recover in spite of them and their threats.
While in general, the FBI has stated time and time again to NOT PAY THE RANSOM—because in doing so you are waving a big red target stating that you’re willing to pay—not to mention the fact that you’re filling their coffers and allowing them to grow they cyber crime businesses.
The reality in 2019 is that many folks have succumbed to attacks and now are paying hefty ransoms either because their cyber insurance providers told them that’s all they’d be able to cover or because they had no other options (they simply weren’t prepared for a recovery effort).
Scores of municipalities and businesses caught with their networks frozen and ability to work halted have made the hard decision to pay the ransom.
continue reading
Have you been to the store lately and wondered why in the heck do certain computers—with seemingly similar specs—are priced so different?
The answer might lie in what processing chip is inside the machine.
As we get into addressing the Windows 7 chaos—that is the end of Windows 7 on January 14, 2020—we are facing a time where your organization will likely need to upgrade or replace old machines.
When you’re thinking about purchasing your next laptop or desktop computer, you might want to understand the differences between Intel and AMD chips.
continue reading
I’m sure you remember the last time you were sick. Maybe your head was pounding, your nose completely stopped up, as you recall, you might have had the worst cough in history. Fortunately, we are pretty good at battling infections—even if we have to sleep practically non-stop for a couple of days.
More than likely, our bodies will fight off whatever wasn’t welcome and we’re confident we’d get back to the daily grind pretty soon.
While your body is healing itself, the symptoms of that illness might be indicative of a variety of health issues.
continue reading
But, unfortunately, there are many problems.
Why are your emails missing their inboxes?
At this point in 2019, I’m sure most of you are aware of SPAM and SPAM filters. Depending on your email solution, you may be using a variety of different algorithms that automatically filter through your mail and determine whether something looks “spammy”.
Spam filters search and flag a variety of words and language, pictures, subjects, IP addresses, among other data encapsulated in your email, to determine whether it ends up in your inbox or in your junk or filtered-out mail.
Your email gets a spam score.
continue reading
Security is not getting any simpler. With more exploits targeting your users’ personal information, today more than ever before we need to make sure every single person on your team is vulnerable to a personal cyberattack, which may end up putting your business at risk.
Today, I want to go through some simple steps everyone on your team can take to protect their identity by being conscious of their Facebook security.
Here are 11 simple Facebook security tasks to ensure your teams are keeping their information safe online:
continue reading
When was the last time your kids received phishing training? Are you teaching them about good cyber hygiene?
Cybersecurity experts are warning this year that your students—mainly ones that are forging their own digital footprints—are growing targets of cybercrime this year.
As we alluded to a few weeks ago, cybersecurity is not simply something you can think about exclusively in the workplace. Today, if you are not taking basic precautions at home as well, you are likely leaving yourself, your family and your workplace vulnerable to cyberattacks.
Today, I want to focus on a specific cyberattack that we’ve been seeing repeatedly pop up in colleges and schools around the country. It’s an attack that might seem obvious to those of us with many years of getting phishing emails (although we have found that if you aren’t continuously getting training and don’t have technology in place to prevent occasional mistakes, your previous experiences will only help you so much).
continue reading