Security


Intro to UniFi Access

Traditional keys are outdated in the realm of access control. Moving to a more sophisticated system, such as the Ubiquiti Networks UniFi Access, is essential. This rewards you with a system that uses badge cards, which eradicates the risk of lost keys and key duplication. With the user-friendly dashboard, you can easily add or revoke access to users, check the access log of each user, and review video recording of each entry. The system’s design is sleek and professional, blending seamlessly with any environment. Customizing user permissions and assigning different access levels in each area is also possible with this game-changer in access control. It provides real-time alerts for unusual happenings, keeping you well-informed and ensuring high-security standards. Upgrade to the UniFi Access system today, and enjoy the benefit of peace of mind.


Consumers beware – fake antivirus

Tips to avoid getting scammed on the web Browsing the web comes with its risks and there isn’t a day that we don’t hear about someone who got scammed or infected with malware. From compromised websites to malvertising, cyber criminals are out to make some money using whatever trick they […]


The difference between Pi-hole, NextDNS, ad blockers, and Cloudflare

Pi-hole, NextDNS, ad blockers, and Cloudflare are all different technologies that can be used to improve internet security and privacy, but they each have their own specific features and functions. Pi-hole is a type of software that can be installed on a local device, such as a Raspberry Pi, and […]


Web browsers are getting infected with malware through extensions

We are out in the field and see the trends that crop up and we have seen an abundance of malware in users browsers like Chrome and Firefox. The prevalence of these attacks means you should be vigilant and have your browsers checked. Symptoms of browser hijacking Evidence or effects […]


Using Authenticators in 2020

The current state of security forces us to think of new ways to protects our accounts. You must use 2FA, two-factor, dual factor, multi-factor authentication for your accounts to keep your accounts safe. But with the rapid adoption of new authenticator apps to manage logging into websites means we are […]


Yubikey

Use Lastpass + Yubikey To Raise Your Security Posture

We originally started this post to tell people about Security Keys, but it also added a bit of Password Manager to the article. We have updated it to include more information on the password manager. The password manager has always been at the center of this blog posting. We want […]


uBlock Origin vs AdBlocker vs Pi-Hole

The topic of ad blocking as a security measure is often misunderstood. Besides the fact that ads can be annoying they can also bring with it malvertising. Malvertising is advertising that can be dangerous to your computer, mobile device, browser, or any device. Why do I need it? Fake Ads […]

ublock-origin-vs-adblock-vs-pi-hole

Who is NIST and what can Standards do for my business?

Without having to reinvent the wheel, you can find information on how to secure your data from the National Institute of Standards and Technology (NIST.) As system administrators we use NIST for quite a few references.  Namely, the NIST National Vulnerability Security Database.  NIST has established standards for just about […]

Computer Bugs & Exploits