If you’re a Microsoft Windows user and still have Apple QuickTime installed on your machine, you need to remove it immediately. Apple has ceased updates for it and the Department of Homeland Security’s U.S. Computer Emergency Readiness Team (US-CERT) has strongly advised QuickTime to be removed from Windows machines. The recommendation comes after researchers reported two new critical security holes in QuickTime—vulnerabilities that won’t be patched!
And you’ve probably been at risk for some time. At first, the recommendation to cease use of QuickTime was in response to a recent report that Apple will no longer be providing security updates for the Windows version. But many security organizations, including US-CERT, have recently discovered that Apple stopped updating the QuickTime for Windows software for some time. In fact, the tech company deprecated all developer APIs for QuickTime on Windows back in 2013.
continue reading
When I was a kid, I’d spend endless hours huddled around my Apple II-e computer all summer long programming on a green screen—never would my mom ever worry about me getting scammed or hurt from bad guys online. The notion that anyone would do me harm through my computer was inconceivable.
But times have changed—and with more exposure online than ever before, we really have to be careful that our kids are safe online.
We’ve been talking about cybersecurity for months now and in our discussion of the latest crimes and schemes hackers and thieves are pursuing to take advantage of you and your business. Now that spring terms are ending soon and summer break is around the corner, I wanted to give you all some steps to take to make sure the kids in your life are protected as well.
continue reading
What you NEED to know about the latest Cyber Fraud!
The FBI just released a warning to all US businesses of an increase in email phishing scams—especially those targeted at CEOs. The business email compromise scams (aka, BECS) is a scheme that many businesses like yours have already fallen for.
While I have been talking my head off about security issues, like phishing attacks, for a while now, I couldn’t quantify the damage cyber scams have been wreaking on businesses similar to yours—that is until the latest FBI report revealed the details I’ve been hoping weren’t so bad!
continue reading
Thousands attacks spread around the globe—many targeting the US.
How do you where these hackers were located? The Internet is based on Internet Protocol (IP) addresses. Every country has different IP addresses and every place, every organization has some connection via an IP address.
By checking international IP codes, we can trace incoming and outgoing network traffic over a network. Because there are so many computers linked in cyberspace nowadays, it’s easy for a single hacker to infect thousands or even hundreds of thousands of computers with one attack.
While major cities are big targets, we find that many are aimed in your neck of the woods!
continue reading
The secret to our success
I can’t believe Dynamic Edge has been helping businesses get rid of their computer headaches for 17 Years! It feels like yesterday when I started DE from my college dorm room. How we have improved since then!
Not to toot our own horn too much, but I think we’ve accomplished a lot since DE’s start—always aimed at giving our customers the best technical support possible.
Here are some of the facts:
—We enjoy helping people— According to a recent study, going out of your way to help people actually reduces stress. So that is what we do, we go above and beyond. In fact, the industry standard is 84% positive interactions, and we run at 96% positive responses from our users on our help.
continue reading
Nowadays, the reality is that business networks get breached daily—and the fact is that the less security measures you take, the more likely you are to a severe hack regardless the size of your business. But what you might not realize is the more security measures you take to prevent a breach, the more downstream savings.
In this post, I will highlight how investing up front in network security will pay off big time! I call it the Cybercrime Snowball Effect because with every breach comes exponentially more costs.
You prevent your network getting infected—first and foremost, you avoid having malware installed and slowing down your machines. Malicious software commonly takes up processing time, uses resources and takes up space on local machines. The first few snowflakes form from your individual workers not getting their work done—or having problems with latency, slow computers and individual computer headaches!
continue reading