Dynamic Edge Author Archive
Are Your User’s Passwords On The Dark Web?
An anonymous hacking ring just released nearly 890 million credentials last week on the Dark Web.
True story. Cybersecurity experts were able to find pages on the nefarious Dark Web—the places on the web where people are anonymously selling and trading elicit materials and information.
Many of the websites and companies where the credentials originate—32 that we know of—have recently released press releases of cyberattacks and data breaches on their systems.
continue reading
Let’s face it—policies matter.
We all need—especially in organizations like yours—a good way to track our policies back to compliance standards and enforce them through various procedures
The problem we’ve seen is that many organizations are often managing these policies and procedures in Word documents, Sharepoint files, or even in Excel spreadsheets, making the task of enforcing compliance—ensuring that procedures and policies match up with changes in compliance—a real heck of a task.
How are policies and procedures getting misplaced, outdated, unseen, or even lost?
continue reading
“Talking about this service issue reminds me why I love working with your company”.
That was a comment that come up in a conversation I had with one of my clients last week.
What we were discussing was an issue that had arisen during the week, leaving some concern that we might not be doing everything the way it should be done.
Instead of simply giving lip service to our clients, we listen to problems they have with our service. In fact, we treat service issues very seriously.
continue reading
Microsoft announced that it will terminate support for Windows 7 on January 14, 2020. While January 2020 seems a faraway date, the clock is ticking—and security experts warn that 11 months is not a very long time to plan and implement a strategy to transition from the Windows 7 operating system.
With that announcement came a LOT of confusion about what exactly that means. Will you be able to run Windows 7 going forward? And what exactly does it mean that support is terminated?
Generally, Microsoft promises 10 years of support for business and enterprise software. This support period is split up into two periods: Mainstream Support and Extended Support.
continue reading
They might be giving away more than they’d bargained to.
Hackers have actually come up with quite a devious way to get information from your users. In effect, by asking them to verify their identity through logging into their Facebook or other social media account—they are on their way to steal your user’s identity.
What are these scams called?
It’s actually another kind of phishing attack.
continue reading
Recently, there has been a lot of chatter from people concerned that their devices connecting to the internet may be compromised or experiencing issues.
For many of these devices, you might not need to be concerned, as long as you are making a habit of following a few ‘good housekeeping’ best practices when it comes to cybersecurity.
I want to take a few minutes to remind you of a few easy ways you can make sure your devices—both in the office and at home—are secure.
Even if your device hasn’t been hacked, your accounts may be vulnerable because your email addresses and passwords have been compromised, published on the Dark Web.
continue reading