LinkedIn’s Lackadaisical Approach to Removing Fake Profiles

Fake LinkedIn profiles continue to flourish at LinkedIn thanks to the company’s nonchalant approach to removing them after a notice of fake profile has been filed.  To illustrate, I reported this fake LinkedIn profile multiple times starting on April 15, 2017.  A LinkedIn representative responded on April 16, 2017 saying that LinkedIn’s “engineering team is working on it but there's no estimate as to how long that might take” to remove the fake profile.

The Definition of “Password”…by dStringer

PASSWORD

a secret word or phrase that must be used to gain admission to something.

a string of characters that allows access to a computer, interface, or system.

 

It's just obvious that one of the main focuses of an I.T.company is cyber security.

COWABUNGA…SURFING’S UP! by Dstringer

In several blogs now, we have discussed Social Engineering and other means of compromising security in this technical age.  While technological advancement has no doubt made life much more interesting and convenient, it has also caused much more danger and frustration.

“TIS THE SEASON TO BE CAREFUL”…by dStringer

Today marks exactly 10 days before Christmas...the mad rush to get all of the Christmas responsibilities done is at its most heightened point!  Folks are in a hurry, hassled and stressed.  When our focus is on a million things, it may not be on security diligence while we are out and about during the Holiday season.

Ho Ho Ho…or OH NO! OH NO! OH NO!!! How to Avoid Holiday Cyber Criminals by dStringer

The first week of December has come and gone and most of us procrastinators are finally beginning to start our Christmas shopping.  Shopping on line has become so easy lately, that this year, on line sales are rivaling "Black Friday" sales.  In some cases, you can order as late as Christmas eve and have your gift delivered on time!  So simple and convenient.

Little Companies…Big Hacks…by dStringer

In musing about what I was going to write in today's blog, I turned on my T.V. to get my morning news fill and there it was...another hacking story.  "Well", I told myself.  "I've written about cyber security many times.  Do I write about it again"?

Ahhh.

THE HIGH PRICE OF “FREE-DUMB” by dStringer

I love coffee...which is why I love coffee houses.  So I frequent coffee houses all the time.  There never is a time that I'm in a coffee house that it isn't filled with students, writers, on-line shoppers, YouTube aficionados...all ardently conducting  their business on their laptops or tablets.

I DON’T NEED NO STINKIN’ TECH SUPPORT…by dStringer

In today's "instant gratification" society — in which heightened customer expectations and 24x7 accessibility demands really burden small business — little time remains for much else. Small businesses often don't have the resources or inclination to track the latest computer news, security threats, or even common break/fix tips.

THE BIGGER THE CHALLENGE…THE BIGGER THE OPPORTUNITY!!

The ever-evolving world of technology presents a very unique challenge to those of us presented with the stewardship of navigating corporations through the sometimes choppy waters of Cloud Computing and Cyber Security.  It is our job, primarily and most importantly, to put our corporate client's mind at ease.

“BEWARE OF THE WOLF IN SHEEP’S CLOTHING”…Further Exploration Into Social Engineering…by dStringer

Oh my goodness...!

Not too long ago, I wrote a "Social Engineering" blog that I thought was pretty detailed.  It discussed different types of "Social Engineering" in depth; warning signs and what steps to take if you feel you've been victimized.

It truly is the Wild West out there.