Security


Web browsers are getting infected with malware through extensions

We are out in the field and see the trends that crop up and we have seen an abundance of malware in users browsers like Chrome and Firefox. The prevalence of these attacks means you should be vigilant and have your browsers checked. Symptoms of browser hijacking Evidence or effects […]


Using Authenticators in 2020

The current state of security forces us to think of new ways to protects our accounts. You must use 2FA, two-factor, dual factor, multi-factor authentication for your accounts to keep your accounts safe. But with the rapid adoption of new authenticator apps to manage logging into websites means we are […]


Use Lastpass + Yubikey To Raise Your Security Posture

We originally started this post to tell people about Security Keys, but it also added a bit of Password Manager to the article. We have updated it to include more information on the password manager. The password manager has always been at the center of this blog posting. We want […]

Yubikey

ublock-origin-vs-adblock-vs-pi-hole

uBlock Origin vs AdBlocker vs Pi-Hole

The topic of ad blocking as a security measure is often misunderstood. Besides the fact that ads can be annoying they can also bring with it malvertising. Malvertising is advertising that can be dangerous to your computer, mobile device, browser, or any device. Why do I need it? Pop-up and […]


Computer Bugs & Exploits

Who is NIST and what can Standards do for my business?

Without having to reinvent the wheel, you can find information on how to secure your data from the National Institute of Standards and Technology (NIST.) As system administrators we use NIST for quite a few references.  Namely, the NIST National Vulnerability Security Database.  NIST has established standards for just about […]


Designing a Secure Cloud Model (for Small businesses)

These days even the Intelligence Community is using the Cloud to pool resources for greater efficiency and cost savings.  But there is great planning in the Security and operational aspects of these computing resources.  A hybrid approach would seem almost necessary to allow for disaster recovery. When planning a Cloud […]

Computer Bugs & Exploits