David has been working in the IT industry for 28 years. His wealth of experience has been gained by both continuing education and streetwise experience.
Do you need an insight into security threats on the internet. This would be handy for a presentation or school or college project. This white paper is from my friends at LogicNow. Johnson Data Management uses LogicNow – Max Remote to monitor clients systems, including threats and security attacks. Click here for CyberThreatGuide_LOGICnow white paper…
New ransomware variant Jigsaw deletes files as it waits for payment “A new ransomware program dubbed Jigsaw encrypts users’ files and then begins to progressively delete them until the victim pays the equivalent of $150 in Bitcoin cryptocurrency,” Computerworld reports. Discovered by BleepingComputer.com and disclosed in a blog post, Jigsaw “deletes one file after the first hour has…
A new version of ransomware called “locky” has become active.The end result hasn’t changed – all your document files etc will be encrypted and you must pay a ransom to”buy” the encryption key to recover them. Backup regularly!! This has been, is now, and will be in the future the best, cheapest way to recover…
Weapons of Choice: When to Use File Backups vs Imaging Backups Pretty much any contemporary backup solution you find is going to allow you to perform backups both at the image level, and at the file level. But when will each backup type best suit the kind of data you’re looking to protect? Right off the…
The term “Orwellian” is referred to a lot these days. It’s defined on Wikipedia as a “societal condition” that is “destructive to the welfare of a free and open society.” Anyone who keeps up to date with what’s going on in the world of IT privacy and security will understand the word’s current pervasiveness in…
A deeper dive into the passwords from the recent Gmail leak reveal some interesting psychology on why we choose the passwords we do. For one thing, the generated passwords are very easy to spot when you take a look at the data, because they’re so rare. That means most of us are still creating our…
Sales coach Paul Kenny of Ocean Learning asked the conference attendees, point blank, if they ever made a sale purely based on luck. The show of hands was significant. “Sometimes,” he said, “you go out there and you were the least-worst option.” He also offered this powerful pointer: “If you don’t really know why you…
Monitoring and filtering Web use isn’t just about controlling and micro-managing staff. Consider the following: 1. Staff “abuse” of the Internet can have consequences that go beyond the fact that businesses are paying employees to waste company time. If staff use the Web for immoral or illegal purposes, the legal implications could have an effect…