Recent Posts
Jan 04, 2021
Backdoor Found in Zyxel Products
Own a Zyxel firewall or VPN product? Patch it now! The Hacker News reported that EYE researcher Niels Teusink found
Read MoreDec 22, 2020
Beware Running CHKDSK on Windows 10
According to a post on Bleeping Computer, Microsoft has acknowledged a problem when you run the chkdsk /f command on
Read MoreDec 21, 2020
Stop Paying Router Rental Fees
Why is it that communications companies are so hated by consumers? It really doesn't matter if the hated company provides
Read MoreDec 17, 2020
Zoom Continues Free Calling for the Holidays
It started with Thanksgiving, when Zoom lifted the 40 minute restriction on video calls for those using the free version
Read MoreDec 16, 2020
Tips to Prevent Business Email Compromise (BEC)
BEC has been around for years. Cyber criminals have upped their game during the pandemic. The attacks are more frequent
Read MoreDec 15, 2020
Group End-to-end Encrypted Video Calls on Signal
Signal has always been our go-to platform for secure communications. Many other vendors use the Signal technology as the basis
Read MoreDec 14, 2020
Don’t Use US-Based Virtual Private Networks
We've said it many times in our security presentations. Not all VPNs are created equal. It's not just about whether
Read MoreDec 10, 2020
Microsoft Teams Copies Another Zoom Feature
There are a lot of features users like about Zoom. The gallery view is probably the most famous feature that
Read MoreDec 09, 2020
Check Your Cyber Insurance Exclusions
Hopefully, readers do have some sort of insurance coverage for cyber events. The coverage may be a separate policy or
Read MoreDec 08, 2020
Remote Desktop Tools for Windows 10
Remote desktop tools are used to take control of another machine and even transfer files between them. The tools are
Read MoreDec 07, 2020
Change Your Displayed Name for Gmail
If you are a Gmail user, there is a very simple way to change how your name is displayed to
Read MoreDec 03, 2020
Tips for Strong Passwords
While there are many efforts to implement a passwordless authentication system such as biometrics or tokens, we're not there yet.
Read More