The IT Support Education Center
The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.
It's no surprise to hear that WordPress is the single most hacked website platform on the internet. Considering that WordPress sites make up about one-third of websites, you might even think this is a normal statistical fact, but it's not. Time and time again, dozens to thousands of sites are exposed to hackers and actively hacked, not because WordPress sites are a common target, but because WordPress sites are unbelievably easy to hack.
Phishing attacks are growing more sophisticated and spam filters aren't as effective for every kind of attack. Old-style spammers sent the same message to many people, hoping some of them would take the bait. The newer, more dangerous approach targets individuals. It's called spearphishing, whaling, or high-stakes phishing.
Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.
In the same way that you might bait a hook to reel in while fishing, hackers try to bait individuals and businesses through the method of what is called phishing. This cyber phishing “bait” may not seem as obvious as a sparkling plastic lure on a hook - unless you know what to look for.
Some people live their lives on the internet. When this cuts into work time and creates security risks, employers have to deal with the problem. Depending on what sites employees visit and how much time they spend, browser usage during work time can raise multiple issues. It can impact network bandwidth. Viewing some material where other employees can see could be deemed harassment. Visiting dangerous sites could let malware get into company computers or leak confidential information.
Millions of Americans began working from home for the first time this March. While some companies had the ability to provide laptops or send office desktops home with them, many more required workers to use personal computers and might have inadvertently created a security vulnerability because their computers are still running Windows 7. The process of loading company software onto so many machines left the operating systems as an afterthought. However, support for Windows 7 ended January 14 and your company is facing major risks if it's still in use, even if you have antivirus and a firewall.
People don't really know how their cyber security skills are going to measure up until they've tried them. Everyone would prefer never having to face a real-life cyber security incident. It's better if they can try out their skills on simulated threats. They can make mistakes without suffering anything worse than embarrassment. The lessons they learn will help them to deal with real threats when they happen.
The month of April has been filled with web meetings and uncertainty. While we've been advancing our video skills more than we ever thought possible, we’ve also been figuring out how to maneuver through our new circumstances. Like many of you, I have been working hard on getting paperwork together and submitting applications for the Payroll Protection Program.
When Boris Johnson, Prime Minister of the UK, sent out a tweet that included his computer screen showing his first cabinet meeting on Zoom, little did he know that he was helping hackers find their way into his meeting. His monitor clearly showed the meeting ID, and sharing it with the whole world on social media was like giving hackers a key to their conference room.
Welcome back to the second half of our two-part article on the top network security threats of 2020. If you haven't seen part one, jump back to the beginning before diving into part two.
I don’t even know where to start. If you’d have told me two months ago that we’d be debating over which businesses are “essential” and that millions of Americans would be sent home to work overnight, I would’ve told you you’re crazy. But here we are.