SomethingCool.com LLC - Making IT Personal Since 2000

Security

What You Need to Know about Remote-Access VPNs

November 14, 2017
|

If your employees often travel for business, work from home, or use their own personal devices for work, it is important to provide them with a secure, reliable way to connect to your company’s computer systems. One way to do this is to use a remote-access […]

Read more

Worried about KRACK? Don’t Panic, Just Patch

November 14, 2017
|

In October 2017, a security researcher announced that he found a vulnerability in the Wi-Fi Protected Access 2 (WPA2) encryption protocol. WPA2 is used to secure Wi-Fi communications in most smartphones, laptops, routers, and other wireless devices because it encrypts data with an extremely hard-to […]

Read more

Don’t Let Your IT Policies, Plans, and Strategies Collect Dust

September 7, 2017
|

To help keep IT systems running securely and efficiently, businesses often create IT policies, plans, and strategies. For example, businesses establish comprehensive acceptable use, mobile device, and email policies to protect their IT assets. They also develop detailed disaster recovery plans and data backup strategies so they can […]

Read more

Don’t Let Your Business Become the Next Spear Phishing Victim

May 30, 2017
|

Spear phishing scams targeted at businesses have proven to be very lucrative for cybercriminals. For example, since January 2015, hackers have stolen over $3 billion (USD) from more than 22,000 companies worldwide using a type of spear phishing attack known as a Business Email Compromise (BEC) scam […]

Read more

WannaCry Ransomware – What You Can Do

May 14, 2017
|

Why this Attack is Different

Stories of a new ransomware attack flooded the news on Friday, and by Sunday more than 200,000 individuals and 10,000 organizations in 150 countries worldwide had been hit.  The size of the attack makes this exploit stand […]

Read more

6 Ways to Make Your IT Security Training More Effective

April 6, 2017
|

Cybercriminals like to target the weakest link in companies’ security defenses — and that link is often the employees. But it does not have to be that way. Your employees can provide an important line of defense against cybercrime if you educate them about IT security. For this training […]

Read more

How to Set Up Two-Step Verification for Your Google Account

April 6, 2017
|

As the series of massive Yahoo! data breaches demonstrate, having a strong password is not always sufficient. Cybercriminals can hack into companies’ databases and steal customers’ login information. If the password for your Google account is stolen, you could lose personal information, send unauthorized emails, and risk having […]

Read more

Cybercriminals Are Posing as Job Applicants to Spread Ransomware

April 6, 2017
|

If your business is hiring, you should be aware of a new phishing attack in which cybercriminals are posing as job applicants. Falling victim to this attack may leave your business infected with the GoldenEye ransomware. This phishing campaign was initiated in Germany, but security experts expect it […]

Read more