Is Periodic Password Change a Good Security Practice? Cyber security experts have almost universally agreed that periodic password changes are likely to do more harm than good. This is largely the result of research that shows passwords are most prone to cracking when they’re easy for end users to remember, such [...]
About OC IT AdminThis author has not yet filled in any details.
So far OC IT Admin has created 32 blog entries.
Office 365 Security Best Practices As the number of organizations migrating email services to Microsoft Office 365 (O365) and other cloud services increases, the use of third-party companies that move organizations to the cloud is also increasing. The Department of Homeland Security has issued a Microsoft Office 365 cyber-security statement. [...]
Small Businesses' Guide to Windows 7 End of Life With the Windows 7 End of Life date now rapidly approaching, Microsoft is eager to move people from Windows 7 to newer version of its product before the support ends on January 2010. The 10-year-old operating system is still incredibly popular, [...]
These days, it’s not uncommon to wake up in the morning and read headlines like: 300 million user accounts breached after a cyber-attack, Hackers gained access to millions of social security numbers, 500 million personal records were stolen from XYZ hotel servers. An ordinary citizen can assume that, a) he/she [...]
Time To ReThink Backup Imagine if life had a rewind button. Make a mistake? Just hit rewind and everything is back to normal. While the chances of any of us experiencing such thing outside of Hollywood movies is ZERO, the ability to use the rewind button in our digital life [...]
Your Worst Nightmare: Fileless Malware Attack "By now, everyone pretty much knows what malware is and how it works: Victims receive an email telling them that if they just open the attached PDF, their entire life will morph into heaven on earth. Or they get an email telling them that [...]
If it seems like every day there is news of a malicious Android app being removed from the Google Play Store, your assumption is actually wrong. It’s closer to 2,000 apps per day. Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications. These [...]
What is Cryptojacking? Cryptocurrency is fueling a new kind of cyber attack: cryptojacking. Cryptojacking is the secret use of your computing device to mine cryptocurrency. According to Symantec, Cryptojacking attcks exploded by 8500% in 2017 with Symantec logging 1.7 million in December alone. With only a couple lines of code, [...]
SamSam Ransomware Attack on the City of Atlanta's Government Systems City officials in Atlanta, Georgia are still trying to recover 10 days after a ransomware attack on municipal computer systems hit at least five out of 13 departments, knocking out some city services and forcing others to revert to paper [...]
Business Continuity and Disaster Recovery Planning Your business’s critical data is always at risk. What kind of risks? How about natural disasters, human errors, hardware failures, and malicious attacks… for starters?! As an informed business owner, you take all the precautionary measures to prevent disasters from happening by keeping your [...]