SomethingCool.com LLC - Make IT Personal

Blog

WannaCry Ransomware – What You Can Do

May 14, 2017
|

Why this Attack is Different

Stories of a new ransomware attack flooded the news on Friday, and by Sunday more than 200,000 individuals and 10,000 organizations in 150 countries worldwide had been hit.  The size of the attack makes this exploit stand […]

Read more

6 Ways to Make Your IT Security Training More Effective

April 6, 2017
|

Cybercriminals like to target the weakest link in companies’ security defenses — and that link is often the employees. But it does not have to be that way. Your employees can provide an important line of defense against cybercrime if you educate them about IT security. For this training […]

Read more

How to Set Up Two-Step Verification for Your Google Account

April 6, 2017
|

As the series of massive Yahoo! data breaches demonstrate, having a strong password is not always sufficient. Cybercriminals can hack into companies’ databases and steal customers’ login information. If the password for your Google account is stolen, you could lose personal information, send unauthorized emails, and risk having […]

Read more

Cybercriminals Are Posing as Job Applicants to Spread Ransomware

April 6, 2017
|

If your business is hiring, you should be aware of a new phishing attack in which cybercriminals are posing as job applicants. Falling victim to this attack may leave your business infected with the GoldenEye ransomware. This phishing campaign was initiated in Germany, but security experts expect it […]

Read more

How to Avoid Falling Victim to Fake Malware Alerts

March 14, 2017
|

Suppose you are working on your computer and suddenly an alert pops up telling you that your computer is infected with a virus. Would you be able to tell whether this alert is legitimate? Don’t feel bad if you said “no”. Cybercriminals have become adept at creating […]

Read more

11 Ways to Secure Your Business’s Wireless Network

February 17, 2017
|

Wireless networks are popular in small and midsized businesses because they are easy to set up and convenient to use. However, if a wireless network is not properly secured, hackers within range can access it and infiltrate your network.

Here are eleven ways you can lock down your […]

Read more

3 Emerging IT Trends That Will Start Impacting Businesses This Year

February 17, 2017
|

Each year, new IT trends arise, but they are typically not too surprising or revolutionary. However, this year, three innovations have matured to a point where they are beginning to impact how businesses operate. What’s more, these technologies have the potential to transform the IT landscape in […]

Read more

Warn Your Staff about This Malicious Email

February 17, 2017
|

Be on guard — a fake security email is making the rounds. Disguised as an email from Microsoft, this phishing email is deceiving people into infecting their computers with a bot called Neutrino. This bot enables cybercriminals to take control of the infected machines. The hackers then use the […]

Read more