Showing posts from January, 2019

Why You Need To Upgrade Your Windows 7 Machine, Seriously.

Many of you are probably still using a Windows 7 machine. 42% of all windows PC's are running Windows 7 even with Windows 10 being out for nearly 3.5 years already.¹ Some may say that's a testament of how great Windows 7 is, but are you sacrificing cost, security, and optimization for whats comfortable? The timeline for mainstream support came to an end in 2015, while enterprise licenses are still supported through January 2020. This extended support may sound great, but the 11 months you have left will fly by faster than you think, especially if you have multiple machines to upgrade.

Why Do I Have to Upgrade?

All good things must come to an end sooner or later. The speed at which tech changes is so fast, Microsoft operating systems are only optimal for about 10 years before they can't keep up anymore. Fortunately this isn't a bad thing. With this end of life comes Windows 10. The OS, which came out in 2015, touts enhanced features like Device Guard- which keeps your co…

Faulty Cyber Security in Healthcare

In the U.S, over 3.7 million people have medical devices connected to their body- that doesn't include the millions who use fitness bands. While these devices are useful and even critical for your well being, are you sure the data from them is safe? With laws like HIPAA and HiTech in place, you would think your personal, sensitive information would be safe and confidential with your doctor, but with more technology integration in healthcare, the risk for data breaches has increased. While technology in healthcare is not a new concept, the rise of biometrics like facial recognition, fingerprint scans, fitness watch data, and even implanted devices makes the possibility of data breaches more personal.
The highest cybersecurity risks for the healthcare industry were listed by Clearwater as user authentication, endpoint leakage, and excessive user permissions.² Ways to combat these issues are precautions like making sure only authorized personnel have access to certain information, mai…

What Is Phishing and What to Do About It

If you've been in the workforce in the past 25 years, chances are you’ve heard of phishing. A classic example is receiving an email from someone you don’t know telling you to “click this link to to win $1,000!” or “download this file to get a free version of Photoshop!” It’s pretty easy to tell that it’s a scam. You delete it and move on. The problem today is that phishing attacks have become nearly indistinguishable from the legitimate emails you receive every day. So, how can you tell the difference?
There are a few different types of phishing scams, from fake websites, deception, social engineering, CEO targeting, and more. Here is a list of the most common types of phishing scams:
Deceptive Phishing- This type of phishing is the most common. It’s usually sent to the masses in the shape of your bank telling you that there has been suspicious activity on your debit card and to click a link to verify your account, or a social media site telling you to update your password or else t…

9 Steps to Take to Protect Your Identity Online

As seen in River Vale Neighbors Magazine, December 2018 issue.
Everyday we turn on the TV, radio or computers and hear about companies like Marriott or Dunkin' Donuts that came out with the news they have been breached. Unfortunately for many users, this could mean potential issues with their credit and good name, company security or other potential financial issues.

How do you avoid being a victim when a company you have no control over gets breached or hacked? The following are steps you should take and consider to minimize the impact to your credit and good name, should another breach take place.
The question is not about whether or not another breach will occur, it will happen. The real question is what did you do to protect yourself when the next breach is reported.
Step One: Patches Always make sure that your computer is patched and up to date with the most currently available operating system and application software. This one step alone reduces the risks from your system b…