Posts by Easy IT Support
We have great new posts on Instagram. Come follow us there: instagram.com/easyitsupport
9 Cyber Security Issues That Could Be Leaving Your Data Vulnerable To Attacks
As our reliance on technology grows, so does our need for improved cybersecurity. With so much of our personal information stored in our devices, simply browsing online or enabling certain settings on your smartphone may be leaving you vulnerable to hackers.
Of course, most users aren't well-versed in cyber security. However, you don't have to be a tech expert to ensure your data is protected. Being aware of these issues and making a few easy changes to how you use your devices are great first steps toward better protection.
To help, we asked the leaders at the Forbes Technology Council to give us their tips on what issues to look out for so we can stay safe online and off.
Computer Attack Knocks Weather Channel Off the Air
The Weather Channel knocked off air by 'malicious software attack
The Weather Channel was knocked off the air Thursday morning by what it said was a malicious software attack on the network.
Cyber Security Today: More weak passwords, a key to security and compromised web sites
More weak passwords, a key to security and compromised web sites
Welcome to Cyber Security Today. It’s Monday April 15th. I’m Howard Solomon, contributing reporter on cyber security for ITWorldCanda.com. To hear the podcast click on the arrow below:
Trend Micro has discovered a new piece of malware that tries to install a hidden program on your computer to mine for cryptocurrency. So it secretly uses your computing power to benefit a criminal. The best ways for you to avoid being infected are to make sure all your software is regularly updated, be careful about the links you click on in email, the web sites you go to, and use strong, original passwords for logins. What I want to point out is the attack starts with the malware automatically trying to log in to your computer using a list of common, weak passwords. Here’s a few on the list, passwords you must avoid: 123456; password; football; welcome; login; hello; admin; abc123 and keyboard letters in a row, like qwerty. Now, if trying these and other commonly-used stolen passwords don’t work the malware tries more sophisticated login techniques. But if you make it easy for criminals they’ll take advantage of you. So instead of passwords create easier to remember passphrases. As I’ve said before, use a password manager and, where possible, two-factor authentication.
Top College Student Gadgets For 2019
Top College Student Gadgets For 2019
Once students are done with high school, most of them feel incredibly excited. For most, the high school experience is too limited, and it is time to enjoy some learning freedom. A great way to take advantage of this freedom is to ensure you use technology to your benefits. Forget the summer hijinks and heavy backpacks with books. There are cool technology gadgets that can be used to ensure that you make the most of your education. If you have found a job after completing your high school education, you will enjoy learning that most of the things every college student needs are affordable and will last for years. This article reviews the top 10 electronic gadgets that students require to make their college lives better.
RingCentral 2018 Winner: Hosted PBX Customer Satisfaction
Eastern Management Group customer study pits vendors of hosted PBX against premises PBX systems.
10 New malware attacks to be on the lookout for in 2019- and what you can do to protect your data!
Just when you thought you had all of your defenses in place when fighting Malware, Cyber Attacks, and Ransomware… think again! Cybercriminals are busy crafting new methods of attacks that are ready to take your data for prey and pounce on your personal information. Here are 10 new sneaky attacks to be on the look-out for in the new year!
- Rivaling governments and geopolitical cyber-warfare funding the efforts of cybercriminal gangs to create chaos, steal intellectual property, and profit from fraud and extortion by breaching personal data.
- New variants of ransomware (including doxware, which threatens to publish sensitive data like browsing histories unless a ransom is paid)
- Much more widespread use of cryptojacking (stealing computing resources to mine cryptocurrency without sharing the profits)
- More distributed denial-of-service (DDoS) attacks on critical servers and networks, abetted by the conscription of armies of Internet-of-Things (IoT) devices
- Increasing use of fileless malware (which never becomes disk-resident, only loads directly into memory, and thus evades many signature-based endpoint anti-malware measures)
- More synergistic attacks (in which multiple malware attacks are injected onto a system and the poorest-defended one activated using AI and ML to improve attack techniques
- Continued reliance on phishing as the most effective attack vector for malware, with more sophisticated attacks targeted at higher-value individuals.
- Increasingly target cloud services and edge computing environments with malware attacks
- Enslave legions of IoT devices for use in DDoS and cryptojacking attacks
- Exploit the new attack surfaces and rich data targets presented by 5G networks and applications.
Partnership with Symantec
Why did Easy IT Support partner with Symantec? Because Symantec is a enterprise grade security for the masses. Cyber safety for consumers!
A patchwork of stand-alone security products from multiple vendors is simply too expensive, too complex, and, even worse, it’s proven to be ineffective.
As the world’s leading cyber security company, we deliver a better way forward:
it’s called Integrated Cyber Defense.
An open platform that seamlessly combines security solutions from Symantec and our technology partners into a single framework across devices, networks, cloud, and datacenter infrastructure.
Offering unparalleled
- Threat Prevention
- Detection
- Incident Response
- Managed Security Services
Integrated to reduce complexity for ease of use and lower costs.
SCAM THREAT: Computer ‘virus’ trick continues to target Spain
SCAM THREAT: Computer ‘virus’ trick continues to target Spain
FRAUDSTERS: Microsoft has confirmed this scam has been reported in 16 different countries.
A TELEPHONE scam by con artists purporting to be computer technicians continues to pose a threat in Spain.
The con, in which fraudsters call pretending to be from Microsoft before bullying their victims into allowing them access to their computer, has reportedly been ongoing for 16 years.
Computer-users are being warned scammers will claim a home computer has been infected with a virus before telling them to follow the caller’s instructions and click on a link they have send.