Hardware monitoring is a feature of the motherboard, sometimes as a separate chip on the motherboard, that monitors different aspects of the system. for potential issues. It can measure variables such as the output voltage of the power supply, the speed of the fans that are connected directly to the … Read More
Why is phishing still the most common cyber-attack?
What is phishing? Phishing.org defines phishing as "A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and … Read More
5 Things You Can Do To Make Your Wi-Fi More Secure
2021Why is Wi-Fi security so important? Wi-Fi is a point of entry that attackers can use to gain access to your network without ever being physically inside your building. In this post, we'll be going over a few things you can do to lock down your Wi-Fi for a more secure network. The best part is: … Read More
Office 365 Phishing Attacks On the Rise
Recently, we have seen a dramatic increase in the amount of phishing cyber-attacks aimed at Office 365 users. It's so bad that almost three quarters (71.4 percent) of corporate Office 365 users have at least one compromised account each month, according to a report by Skyhigh Networks. If you are … Read More
Guide to PCI DSS – Part 2: Building and Maintaining a Secure Network
Welcome to SandStorm IT’s 6-part series about Payment Card Industry Data Security Standard (PCI DSS). In this series, we'll cover what PCI DSS is and the various requirements: Part 1 - What is PCI DSS? Part 2- Building and Maintaining a Secure Network Part 3 - Protecting Data (Coming … Read More
Common Browser-based Network Attacks and How to Avoid Them
Day by day, we do more and more through our web browsers. We perform daily work tasks like checking and sending email, visiting websites to learn about news in our chosen fields, and work in web-based operational systems all through our browsers, and outside of the office, we use those same … Read More
How to Spot Fake Virus Warnings
You are browsing the web, minding your own business, when suddenly a screen like the following pops up: You find yourself unable to open anything else or even close the Window. Clicking on “OK” does nothing and, sometimes, you even hear a voice from your speakers telling you that your computer is … Read More
What are the security concerns of IoT?
Welcome to SandStorm IT's 6-part series about the Internet of Things. In this series, we'll shed some light on the basics of IoT. Part 1 - What is the Internet of Things (IoT)? Part 2 - Why do I care about IoT? Part 3 - What are some real-world applications of IoT? Part 4 - What are the security … Read More
How to Win The War Against Spam!
What is SPAM? SPAM is junk mail that you receive that you didn't sign up for. The Merriam-Webster dictionary defines it as "unsolicited usually commercial messages (such as e-mails, text messages, or Internet postings) sent to a large number of recipients or posted in a large number of places". And … Read More
How does the latest Windows Update that removes Adobe Flash Player affect me?
Adobe Flash, originally released by Macromedia in 1995, is a once widely used and vastly capable web application platform. In 2005 Flash player was installed on more devices than any other internet-based media application, including Java, Quicktime, and Windows Media Player. Flash media player … Read More
- 1
- 2
- 3
- …
- 7
- Next Page »