Drag to reposition your photo
by on February 19, 2024
Introduction: If you connect your technology to a network or plug in any type of portable storage device, there are bad guys out there trying to attack you. Without protection, some of those attacks will succeed. You have probably heard of at least some forms of attack: viruses, trojans, worms, spyware, keyloggers, ransomware, adware, and rootkits. The good news is that you don’t need to be a cyber-security expert with detailed knowledge of attacks and protection tools to protect yourself. Ho...
6 views 0 likes
by on January 12, 2024
Malware: The word “malware” derives from malicious software. Malware is software designed to gain unauthorized access to systems and then do harm. Its purpose might be theft, extortion, damage, or disruption. Malware infects systems either through networks or plug-in storage devices. You have probably heard of at least some forms of malware: viruses, Trojans, worms, spyware, key loggers, ransom ware, adware, and root kits. The only things that you really need to know about them are that th...
13 views 0 likes
by on December 20, 2023
First, the bad news: if your computer has access to the internet, bad guys on the internet could have access to your computer to carry out a cyber attack. Now, the good news: a properly configured, capable firewall will provide an important layer of protection.   What is a firewall? ...
23 views 0 likes
by on November 20, 2023
Protecting your technology from cyber attacks is very important, but even if you have good antimalware software and properly configured firewalls on your devices, hackers may still attack your devices by phishing. No, that’s not a misspelling. Phishing is an attack that tries to fool you into giving a hacker with malicious intent access to your technology.   ...
61 views 0 likes