The Definition of “Password”…by dStringer

PASSWORD

a secret word or phrase that must be used to gain admission to something.

a string of characters that allows access to a computer, interface, or system.

 

It's just obvious that one of the main focuses of an I.T.company is cyber security.

COWABUNGA…SURFING’S UP! by Dstringer

In several blogs now, we have discussed Social Engineering and other means of compromising security in this technical age.  While technological advancement has no doubt made life much more interesting and convenient, it has also caused much more danger and frustration.

“TIS THE SEASON TO BE CAREFUL”…by dStringer

Today marks exactly 10 days before Christmas...the mad rush to get all of the Christmas responsibilities done is at its most heightened point!  Folks are in a hurry, hassled and stressed.  When our focus is on a million things, it may not be on security diligence while we are out and about during the Holiday season.

Ho Ho Ho…or OH NO! OH NO! OH NO!!! How to Avoid Holiday Cyber Criminals by dStringer

The first week of December has come and gone and most of us procrastinators are finally beginning to start our Christmas shopping.  Shopping on line has become so easy lately, that this year, on line sales are rivaling "Black Friday" sales.  In some cases, you can order as late as Christmas eve and have your gift delivered on time!  So simple and convenient.

Little Companies…Big Hacks…by dStringer

In musing about what I was going to write in today's blog, I turned on my T.V. to get my morning news fill and there it was...another hacking story.  "Well", I told myself.  "I've written about cyber security many times.  Do I write about it again"?

Ahhh.

THE HIGH PRICE OF “FREE-DUMB” by dStringer

I love coffee...which is why I love coffee houses.  So I frequent coffee houses all the time.  There never is a time that I'm in a coffee house that it isn't filled with students, writers, on-line shoppers, YouTube aficionados...all ardently conducting  their business on their laptops or tablets.

“BEWARE OF THE WOLF IN SHEEP’S CLOTHING”…Further Exploration Into Social Engineering…by dStringer

Oh my goodness...!

Not too long ago, I wrote a "Social Engineering" blog that I thought was pretty detailed.  It discussed different types of "Social Engineering" in depth; warning signs and what steps to take if you feel you've been victimized.

It truly is the Wild West out there.

TO BE…OR NOT TO BE – WHEN YOU SUSPECT IDENTITY THEFT by dStringer

We live with crime everyday.  It's become commonplace...unfortunately.  And, one of the frustrating aftermaths of being victimized by criminal activity is feeling victimized all over again when you try to rectify the situation and normalize your life.

GONE “PHISHING…”

As in anything in life, there is good...but, unfortunately, there is also bad.  So it is in the "tech" world.  There have been so many "lightening fast" advancements in this industry..that definitely is the good part, but the "law" has had trouble keeping up with these advancements.

AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE…by dStringer

We are experiencing an epidemic.  "Hacking" or Data Breaches have become commonplace...and that's dangerous.

As the frequency of hackings has increased, so is the likelihood that you will also be involved.  You may feel that you're a sitting duck in this scenario, because, after all, even though you have been most responsible and have put every security measure of which you are aware in place, you still have no control if your data is breached due to cyber criminal activity involving a third party (EX: Target or Blue Cross).

That is not exactly accurate.