michael geiger at unsplash 1200

Bucket full of bad stuff

Post #5 in threat types Hostile software presents a confusing problem for business owners. It’s hard to visualize the hazards. Words like “worm”, “virus” and “malware” seem interchangeable. Then there …

hoodie B A Pixabay2

Fake Microsoft login screens (Office 365)

Post #4 in threat types Hackers are creating fake Microsoft login screens using official logos and text. Abusing Microsoft’s branding is one more dirty trick in the hackers’ toolbox. “Branding” …

stockvault.net ransomware 236600

Prevent ransomware attacks now

Post #3 in threat types How can you prevent ransomware attacks? What can you do when a box on your screen says files have been encrypted? Stand up now and …

despoof jefferson santos 450403 unsplash

De-Spoof Your Email Inbox

Post #1 in threat types Crooks send fake email so they can take other people’s money. Regardless of the text inside the email, the intent is some variation on unfairly …

blog chips circuit board 1200px

5 Do-It-Yourself Computer Tips

  Some tweaks don’t need a paid professional! Take charge of your workstation with these do-it-yourself computer tips! 1- Install the right software; choose carefully! Do you really need that …