For Immediate Support, Call: (415) 294-5250

There have been so many breaches in the last year, we have learned new lessons that we should have known before. We should also keep in mind that history tends to repeat itself, which means your cyber security is constantly at risk.  I will provide you with my top 7 cyber security predictions going forward. […]

In case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the reason of the decade so far. The hack and subsequent data theft involving half a billion Yahoo accounts is the largest of its kind – ever. Granted, it is Yahoo, where most people […]

If you are like most attorneys, you have some experience with the cloud. While some lawyers use the cloud for nothing more than a “to-do” list and perhaps a calendar, others have embraced the cloud and have what is considered a virtual law office. What are they doing that you might want to do too? […]

With a rise in telecommuting, alongside ever-growing concerns about email security, such as the “sale” of nearly 200 million Yahoo email accounts on the dark web, as well as numerous other security breaches involving hacked and phished email accounts, the shaky ground on which email usability stands could give way to a resurgence in the […]

We are all aware these days of how cautious one must be when it comes to electronic communications of any kind. Con-artists, or confidence artists (the term “artists” used very loosely in this case) or con-men (confidence men) seemingly lurk around every cyber (and even actual) corner to trick you by getting you into their […]

Biometric authentication is all set to replace the traditional username-and-password style of login, thanks in large part to the fast-evolving Internet of Things. There will simply be too many devices and network authentications to keep track of so many usernames and passwords, so biometrics, or access verification based on a body part like voice, fingerprint, […]

Although it’s not a very well-written program, and it hasn’t been transmitted in spam email blasts, the Troj/Fantom-B (as it’s pegged by ransomware-blocker Sophos) or Fantom ransomware does, nevertheless, masquerade as a Windows 10 “critical” update, and will mess up your files and demand money from unwitting email users when it successfully fools recipients. It’s […]

After a “system-wide outage” of their IT network grounded flights globally, Delta Airlines is now the target of a Congressional inquiry. The inquiry is aimed at determining exactly what caused the Delta’s entire IT network to fail. One of the questions U.S. Senators should be asking is, “Why didn’t you have proper data network backup […]

If the many reasons to move to the cloud aren’t apparent to you yet, you must be new to the idea of cloud services. Or, you’ve heard it being batted around for a while but hadn’t checked into it yet. Either way, there’s a lot you should know as a business owner or entrepreneur about […]

It’s called malvertising – a contraction of “malevolent advertising,” – and it’s all over the Web. It’s a particularly nasty bit of malware, purveyed by cybercriminals who get the legitimate-looking ads up on popular sites, and even hiding a malicious ad’s URL inside a legitimate ad. Malvertising has been popping up on such high-traffic, trusted […]

  • Partner
  • Partner
Computer Repair San Francisco IT Support SF