What's the difference between a hacker and an ethical hacker? SumnerOne's IT expert, Jeff Groby, headed off to The Big 550 KTRS to discuss the difference and help a few listeners with device questions for Tech Talk last week.
Last week our IT expert, Jeff Groby joined the crew over at The Big 550 KTRS for our weekly segment of Tech Talk! Jeff joined Guy Phillips and his hosts to discuss Distributed Denial-of-Service (DDoS) attacks and how these cyber crimes have impacted consumers and business owners in the past.
Do you know what one of the biggest threats to your office's IT infrastructure is? Here are a few hints to help you guess if you don't already know. Almost every office across the world has at least one. It's that loner over in the corner that doesn't talk to anyone unless you talk to it first. It likes to communicate using a series of beeping sounds to let you know it's awake and ready to go. Perhaps the weirdest clue of them all, sometimes it likes to eat paper. What's your best guess? If you guessed the new person who started last week, you may want to get them some help because we were actually describing your office multifunction printer! Over the years, your printer has brought forward loads of convenience, but its enhanced abilities have also increased potential risks to your business security.
If you've followed along with the Elf on the Shelf tradition in recent years, you know that the elf is supposed to be reporting to Santa on the behavior of those they are watching over. This year, SumnerOne joined in on the fun and we added Peppermint the Elf to our payroll! Peppermint was our newest employee and we were so excited to welcome her to the SumnerOne family, even if the fun had to be short-lived. After all the fun and games, we knew Peppermint would have to be headed back to the North Pole. We can't wait to see what she will have up her sleeve for next year.
As we wrap up National Cyber Security Awareness Month (NCSAM) we're also welcoming Halloween! This is the time of the year that the fictional monsters come out to play, but what about the monsters hiding behind a keyboard all year long? That's right, cyber criminals are the monsters who are out and about 365 days per year, disturbing the peace and unleashing chaos on end users. Here are our 7 scary facts about cyber security:
To pay or not to pay, that is the end-user's question. When the situation calls for whether someone should pay up in a ransomware attack, our IT expert, Jeff Groby suggests not. People who decide to pay the ransom can actually end up doing more harm than good. You are putting a big target on your back when you pay up by letting the cyber criminals know you're willing to pay. We joined the crew over at The Big 550 KTRS for Tech Talk to chat about polymorphic ransomware in theme with our topic for National Cyber Security Awareness Month!
Practicing strong email safety goes beyond using a good password and being cautious about opening a message that looks spammy. Malicious emails are looking more and more like the real deal every day. This practice is called phishing. Before we can help you to keep your eyes peeled for phishing attacks, it's sensible to explain the nature of those domains for people who have not encountered the term in the past. Phishing is a straightforward concept many hackers will use to steal email and account information by tricking individuals into handing over their details.