Top 5 Pins

What's a Top 5 Passwords list without a good top 5 pins list. Just like passwords though, people usually aren't as good being unique as they think they are. Some don't even try. David Harley originally discussed a data set of common PINs compiled by Daniel Amitay in a...

Top 5 Passwords

Here comes one of my favorite things to look at, the top 5 passwords. It's a good reminder that people aren't as unique as they think they are. It may be a pain to come up with a long, complex password, but the extreme convenience you're using to forgo a secure...

Simple Ways To Mitigate Internet Attacks

We are all potential victims of internet attacks. The tips below are not a definitive guide to completely avoiding attacks but they will at least help mitigate the attacks. You definitely should NOT try to create a scene or provoke any potential attackers. Try to at...

How To Avoid Becoming A Victim Of Fraud

If it sounds too good to be true, then it probably is. This old adage teaches a simple truth. You should be skeptical of offers you find on the web. Be wary when you find something like: Constant high pressure to act immediately on a sales page. An insanely high...

General Internet Information

The internet is a public place. Don't be fooled into thinking you are completely anonymous. Before you install any program or browse any website, harden your system to mitigate internet attacks. Software creators often implement an ability to “phone home.”...

Antivirus Removal Tools

Antivirus removal tools are a staple in every tech's toolbox. Why? You'll end up using them more than you think. You should uninstall your programs, including antivirus programs, through Add/Remove Programs or you can use applications such as Wise Program Uninstaller...

You Really Should Secure Your Wifi

If you haven't already, it's time to secure your Wifi. It's pretty dangerous to leave it open, way more than you can imagine. This is essentially part 2 of How to generally setup your router. After a nice discussion with a few semi-techie friends, I realized that many...

What’s The Biggest Security Risk?

What's the biggest security risk? Have you guessed it? No, it's not the intricacies of BYOD. It's YOU! Top reasons: Posting information on social media. Opening unexpected attachments through email. Sending sensitive files and messages through email. Using work email...

About P2P and Other Stuff to Block

Here are a few things to look out for on user computers on an enterprise environment, namely P2P and other stuff to block. Either create scripts, download uninstallers, or block the protocol from the network. Update: in 2016. More info now available. Remote Admin...

Pin It on Pinterest