Security


Use Lastpass + Yubikey To Raise Your Security Posture

Just when you thought it was good enough to just have a strong password along comes Two-Factor and Multi-Factor Authentication. We have crafted Multi-factor solutions for small businesses, individuals, and enterprises. Here is a nice explanation from Okta on “Two-Factor Authentication vs. Multi-Factor Authentication: What Are the Risks?” If you […]

Yubikey

ublock-origin-vs-adblock-vs-pi-hole

uBlock Origin vs AdBlocker vs Pi-Hole

The topic of ad blocking as a security measure is often misunderstood. Besides the fact that ads can be annoying they can also bring with it malvertising. Malvertising is advertising that can be dangerous to your computer, mobile device, browser, or any device. Why do I need it? Pop-up and […]


Your Firewall Needs An Update

Security should be one of the top things to check on your Router Firewall.  Consider that the U.S., Britain, and Australian government have recently accused the Russian government of maliciously targeting global internet equipment (home routers) for political and economic espionage.  Firmware/software updates to your equipment can help to secure […]

Malware

Asus RT-AC68U (AC1900)

The Best Router Firewall for Home & Small Business 2018

Asus vs Linksys vs Netgear – For 2018 we have some great new routers from Asus, Linksys, and Netgear, they are the top 3 vendors I support in SOHO, small offices, and homes.  There was a time when the Linksys WRT54G seemed like the most popular router for small businesses and […]


Computer Bugs & Exploits

Who is NIST and what can Standards do for my business?

Without having to reinvent the wheel, you can find information on how to secure your data from the National Institute of Standards and Technology (NIST.) As system administrators we use NIST for quite a few references.  Namely, the NIST National Vulnerability Security Database.  NIST has established standards for just about […]


Designing a Secure Cloud Model (for Small businesses)

These days even the Intelligence Community is using the Cloud to pool resources for greater efficiency and cost savings.  But there is great planning in the Security and operational aspects of these computing resources.  A hybrid approach would seem almost necessary to allow for disaster recovery. When planning a Cloud […]

Computer Bugs & Exploits