The Complete Guide to Avoiding Online Scams

The basic rule for surviving internet scams is simple: If it sounds too good to be true, it probably is. A little common sense goes a long way to realizing that you aren’t going to suddenly win the Spanish National Lottery when you didn’t even know you had a ticket.  Here’s our definitive guide to helping you (and your loved ones) stay safe online. …

LifeHacker.com click the link to read the rest of the story. Get our free tools here.

Have you fooled?Join the conversation on our Facebook Page!

Meet the new Microsoft Edge: Your move, Google

Google Chrome and the new Microsoft Edge browser are siblings, but that doesn’t mean they’re equal. Far from it.  The most important difference between the new Edge and Google Chrome strikes right at the heart of Google’s business model. By default, the new Edge turns on tracking protection and sets it to Balanced, which blocks many ads and almost all third-party tracking code. …

ZDNet.com click the link to read the rest of the story.  Get our free tools here.

Download it now!Join the conversation on our Facebook Page!

Iranian Hackers new attacks to breach the US Grid

Given the the threat of Iranian counterattacks, infrastructure owners should be aware of [these new campaigns] and they should consider not just new attempts to breach their networks but also the possibility that those systems have already been compromised. “My concern with the Iran situation is not that we’re going to see some new big operation spin up,” Lee says. “My concern is with access that groups might already have.” …

Wired.com click the link to read the rest of the story. Our FREE Tools can help!

How are you preparing for this?

Join the conversation on our Facebook Page!

Hackers Demand Ransom From Medical Patients After Breach

In a troubling new ransomware twist, hackers are demanding patients of Florida provider Richard Davis, MD pay a ransom to prevent the release of their personal information following a breach of the clinic’s server. … Patients are urged to share the notification with any known patients of The Center…

ampproject.org click the link to read the rest of the story. Our FREE Tools can help!

If hackers did this to your business, could you survive it?

Join the conversation on our Facebook Page!

What will happen January 15, 2020 – to your Windows 7 PC

Microsoft has been warning Windows 7 users for the past year-plus that after January 14, 2020, they’ll get no more security updates to the operating system for free. Even though users will be able to continue to run Windows 7 after that date, they’ll be more susceptible to potential security problems. To hammer that point home, Microsoft is planning to deliver a new pop-up notification to Windows 7 users on January 15, 2020.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Do you need help with this?, Let us know!

Join the conversation on our Facebook Page!

Homeland Security Alert: All Users to update Firefox browsers Immediately

If you use Mozilla Firefox’s web browser, you’ll want to drop what you are doing right now and update it. Now.  Failure to do so, could allow an attacker to take control of a user’s entire operating system—whether they use Windows or Mac. More alarming, the vulnerability is already being exploited…

FastCompany.com click the link to read the rest of the story. Our FREE Tools can help!

Send this to your friends!Join the conversation on our Facebook Page!

CES 2020: The best tech, gadgets on show

This year at CES you will find, 8K TV‘s, bathroom tech, smart car visors, next-gen lighting devices, smart cat boxes, cooking appliances that do it all, and much more…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Are you wanting any of these?

Join the conversation on our Facebook Page!

These five tech trends will dominate 2020

We begin our list with dark clouds on the horizon for Intel: Saying Intel is going out of business … it’s simply not going to happen… That doesn’t mean it is going to be smooth sailing… 5G has plenty of benefits for the mobile operators… Artificial Intelligence (AI) and machine learning (ML) have become the goto technologies for businesses whether they want to boost productivity, increase customer engagement, or drive digital transformation…. Security in 2020: Wider, deeper, stranger threats – don’t forget the basics…

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Will your business follow these trends?

Join the conversation on our Facebook Page!

Be Prepared: Iran can execute cyber-attacks against the US

Homeland Security Warning: Be prepared for cyber disruptions, suspicious emails, and network delays. … Implement basic cyber hygiene practices such as effecting data backups and employing multi factor authentication. Note: Make sure your business can function if there are interruptions to your internet service.

Department of Homeland Security click the link to read the rest of the story. Our FREE Tools can help!

How are you preparing?

Join the conversation on our Facebook Page!

The 6 life-changing tech habits you need this year

Most of these tech recommendations will make anyone smarter and safer, except # 6.  They are saying standard antivirus programs are not as good as Windows Defender, but you need something better than Windows Defender.  We only recommend Next-Gen Antivirus programs like Cylance, Sentinel, Carbon Black.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

Anything else we should add to the list?

Join the conversation on our Facebook Page!

Chinese hackers get around two-factor authentication

Security researchers say they found evidence that a Chinese government-linked hacking group has been bypassing two-factor authentication (2FA) in a recent wave of attacks.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How would you deal with threats like this?

Join the conversation on our Facebook Page!

ALERT! TP-Link routers allow anyone to change your WiFi password

According to researchers in ethical hacking, if exploited, this vulnerability would allow a remote threat actor to take control of device settings via Telnet to connect to a File Transfer Protocol server (FTP) over LAN or WAN.  Exploiting this vulnerability would give the attacker administrator privileges…

Medium.com click the link to read the rest of the story. Our FREE Tools can help!

Do you own one of these?Join the conversation on our Facebook Page!

Windows Hack Attackers! Microsoft Responds With Powerful Counterpunch

It has been confirmed that the Microsoft Digital Crimes Unit (DCU) has been tracking a hacking campaign against Windows users. … The threat group behind these cyber-attacks is thought to be based in North Korea and has been named as “Thallium” by Microsoft and is also known as APT37. …

Forbes.com click the link to read the rest of the story. Our FREE Tools can help!

What else should be done to stop these hackers?Join the conversation on our Facebook Page!

5 Ways to Distraction-Proof Your Mind

To regain control over our attention, our time, and our life, you need to first regain your brain. In this animated video, I provide some practical advice for how we can finally take matters into our own hands to fight distractions instead of waiting for the tech companies to fix the problem for us.

Nirandfar.com click the link to read the rest of the story. Our FREE Tools can help!

How do you deal with distractions?Join the conversation on our Facebook Page!

Accelerate your success with certification training

For anyone looking to advance their professional career, few moves can make as immediate an impact as adding some advanced certifications to the resume.

BigThink.com click the link to read the rest of the story. Our FREE Tools can help!

Are their certifications that you or your team need?

Join the conversation on our Facebook Page!

If You’re Not Outside Your Comfort Zone, You Won’t Learn Anything

As we grow and learn in our jobs and in our careers, we’re constantly faced with situations where we need to adapt our behavior. It’s simply a reality of the world we work in today. And without the skill and courage to take the leap, we can miss out on important opportunities for advancement. How can we as professionals stop building our lives around avoiding these unpleasant, but professionally beneficial, tasks?

Harvard Business Review click the link to read the rest of the story. Our FREE Tools can help!

How do you break out of your comfort zone?

Join the conversation on our Facebook Page!

 

California Consumer Privacy Act: Everything you need to know about the CCPA

California’s new privacy bill is one strict piece of legislation. Whether you are a consumer curious about your new rights or a business worried about compliance, here is a guide to the new rules.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How will your business be affected by CCPA?

Join the conversation on our Facebook Page!

The PC is dead. Long live the cloud PC.

Microsoft is giving up on Windows on the PC. In its place, Microsoft is rolling out its Windows Virtual Desktop (WVD). The Windows Virtual Desktop client is available across Windows, Android, Mac, iOS, and HTML 5. In other words, if you have a browser and a PC, you’ll be able to run Windows as a DaaS.  Microsoft is promoting this not just as a Windows desktop alternative, but as a path forward for die-hard Windows 7 users.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How will your business be affected by this!

Join the conversation on our Facebook Page!

New ransomware strain is now stealing data before encrypting it

The data theft takes place before the execution of the actual ransomware binary that encrypts the data. It is part of a recent trend in the ransomware scene.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How does your business deal with these never ending threats!

Join the conversation on our Facebook Page!

So you want to keep running Windows 7? Good luck with that, small businesses

The end of Windows 7 support is weeks away. Microsoft says small businesses can pay for extended security updates just like their enterprise cousins. … Support for Windows 7 ends in just a few weeks. After Jan. 14, 2020, Microsoft will no longer provide free security updates and bug fixes for the venerable operating system to the general public.  The … upgrade tools still work, and the end result is an apparently valid digital license. But those offers could end soon.  Those updates will be available, however, to Microsoft customers who are willing to pay for the privilege.

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

We can sell you updates, if you wait!

Join the conversation on our Facebook Page!

New Orleans city computers offline after cyberattack

The NOLA.gov website was still down for “unplanned maintenance” Sunday, but emergency services such as 911 and the fire department are still operational, the New Orleans’ Office of Homeland Security & Emergency Preparedness said. The FBI and Secret Service are assisting with the investigation, the city said. …

cnet.com click the link to read the rest of the story. Our FREE Tools can help!

Will your business survive attacks like this?Join the conversation on our Facebook Page!

 

New Ransomware overcomes PC security by rebooting into Safe Mode

SophosLabs researchers have been investigating an ongoing series of ransomware attacks in which the ransomware executable forces the Windows machine to reboot into Safe Mode before beginning the encryption process. The attackers may be using this technique to circumvent endpoint protection, which often won’t run in Safe Mode. …

Sophos.com click the link to read the rest of the story. Our FREE Tools can help!

What would you do, if your computers were encrypted by ransomware?Join the conversation on our Facebook Page!

Microsoft: 44 million user accounts have a serious security problem

After analyzing a database containing 3 billion leaked credentials from security breaches, the Microsoft threat research team determined more than 44 million user accounts had a serious security problem. Here’s what you need to know.

Forbes.com click the link to read the rest of the story. Our FREE Tools can help!

How do you protect your online accounts?Join the conversation on our Facebook Page!

How the Two-Pizza Rule Can Make You a Wildly Effective Business Owner

Jeff Bezos’s two-pizza rule, explained … If you want your team to be different—and to achieve differently—it must be small. The two-pizza rule says that no team can be larger than five to seven people. …

Gusto.com click the link to read the rest of the story. Our FREE Tools can help!

What do you think is the perfect business meeting size?

Join the conversation on our Facebook Page!

Top 5 things to know about open source and the cloud

Cloud software is impeding open source software companies from making a profit. Tom Merritt explains the five things you need to know about open source and the cloud….

TechRepublic.com click the link to read the rest of the story. Our FREE Tools can help!

Are you thinking of using open source software? What are your greatest concerns?

Join the conversation on our Facebook Page!

FBI recommends that you keep your IoT devices on a separate network

The FBI also recommends changing factory-set (default) passwords and not allowing an IoT device’s accompanying mobile app to gain access to too many smartphone permissions. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How are you protecting your network from IOT vulnerabilities?

Join the conversation on our Facebook Page!

New ransomware attacks target your NAS devices, backup storage

The number of ransomware strains targeting NAS and backup storage devices is growing, with users “unprepared” for the threat, researchers say. … Once deployed on a system, the malware will usually encrypt files or full drives, issue its victim with a ransom note, and demand payment in return for a way to decrypt and restore access to locked content. …

ZDnet.com click the link to read the rest of the story. Our FREE Tools can help!

How are you protecting your backups from ransomware?

Join the conversation on our Facebook Page!