Tumgik
markgermanos · 7 years
Text
How the ransomware economy rips you off, part 3
How the ransomware economy rips you off, part 3
Ransomware uses affiliate network, just like TV networks do.
Ever wonder why ransomware has become so widespread these days? An infection in England shut down hospitals. Staff told patients that if they did not have an emergency, go home. The computers were not working.
That is because the money is easy. Ransomware publishers created an affiliate network to spread their poison. At https://www.eli…
View On WordPress
0 notes
markgermanos · 7 years
Text
How the ransomware economy rips you off, part 1
How the ransomware economy rips you off, part 1
Ransomware has its own economy, funded by you.
Ever wonder why ransomware has become so widespread these days? A ransomware infection in England shut down hospitals. Staff told patients that if they did not have an emergency, go home. The computers were not working.
That is because the publishers have found a way to collect money and avoid getting caught. At https://www.elie.net/blog/security/how…
View On WordPress
0 notes
markgermanos · 7 years
Text
National Cybersecurity Awareness Month is in week 2
National Cybersecurity Awareness Month is in week 2
October is National Cybersecurity Awareness Month.
Protecting yourself online is more important than ever. That’s why the Department of Homeland Security created National Cybersecurity Awareness Month. They also broke down action items by week. Here is the advice I found at https://staysafeonline.org/ncsam/about-ncsam/ for week 2.
Week 2: Oct. 9-13.
Cybersecurity in the Workplace Is Everyone’s…
View On WordPress
0 notes
markgermanos · 7 years
Text
CompTIA Executive Certificate in IT Security (Foundations)
CompTIA Executive Certificate in IT Security (Foundations)
Overview of the CompTIA Executive Certificate in IT Security (Foundations).
SACRAMENTO, CA. October 5, 2007. Today, Cameron Park Computer Services announced that its President, Mark Anthony Germanos, achieved the CompTIA Executive Certificate in IT Security (Foundations)designation. CompTIA reports “All too often IT security is viewed as a necessary evil, if not as an outright barrier to doing…
View On WordPress
0 notes
markgermanos · 7 years
Text
National Cybersecurity Month starts today
National Cybersecurity Month starts today
October is National Cybersecurity Awareness Month.
Protecting yourself online is more important than ever. That’s why the Department of Homeland Security created National Cybersecurity Awareness Month. They also broke down action items by week. Here is the advice I found at https://staysafeonline.org/ncsam/about-ncsam/ for week 1.
Week 1: Oct. 2-6.
STOP. THINK. CONNECT.™: Simple Steps to Online…
View On WordPress
0 notes
markgermanos · 7 years
Text
Watch Out for the Equifax Phishing Attack
Watch Out for the Equifax Phishing Attack
Why the Equifax data breach matters.
Earlier this month, Equifax disclosed that someone breached their database and compromised 143 Million records. Equifax is one of three services mortgagors use when determining if you deserve a mortgage for your new home. The data they have on us is…immense. The breach already happened. They are now in cleanup mode.
The phishing attacks have begun.
Scammers…
View On WordPress
0 notes
markgermanos · 7 years
Text
Become the High Hanging Fruit and Protect Your Identity
Become the High Hanging Fruit and Protect Your Identity
Protect yourself by becoming high hanging fruit.
High hanging fruit is tough to reach while low hanging fruit is easiest to reach. Suppose you went to an apple orchard and decided you wanted an apple. The owner said it was ok to pick one from a tree and eat it for lunch. You would probably grab one from one of the lower branches. The apple you chose is low hanging fruit.
Suppose you wanted…
View On WordPress
0 notes
markgermanos · 7 years
Text
How to Know if a Website is Safe - Before You Click the Link
How to Know if a Website is Safe – Before You Click the Link
When in doubt, check to see if a website is safe.
You have to be careful these days. People use fake websites to promote their agendas, spread malware and rip you off. You can check a website if you are unsure whether or not that website is safe.
A story for you.
Jim is researching new office furniture. Most of his is old and dingy. He also knows potential patients walk into his dentist office…
View On WordPress
0 notes
markgermanos · 7 years
Photo
Tumblr media
Anyone getting tired of this nonsense heat wave?
0 notes
markgermanos · 7 years
Text
Would your Sacramento IT support help you recover a lost password?
Would your Sacramento IT support help you recover a lost password?
Sacramento IT support includes managing passwords.
Whomever you hire as your Sacramento IT supportpro, he needs to manage your passwords. If you forget one, a simple phone call should save you. I am sad to report…that is not always the case. I inherited a situation where nobody managed the company’s passwords. The boss thought he could do it himself. Recovering was a costly and frustrating…
View On WordPress
0 notes
markgermanos · 7 years
Text
Would your Folsom IT support pro help you recover a lost password?
Would your Folsom IT support pro help you recover a lost password?
Folsom IT support includes managing passwords.
Whomever you hire as your Folsom IT supportpro, he needs a proactive solution that manages your passwords. If you forget one, a simple phone call should help you recover. I am sad to report…that is not always the case. I inherited a situation where nobody managed the company’s passwords. The boss thought he could do it himself. Recovering was a…
View On WordPress
0 notes
markgermanos · 7 years
Text
Would your IT support solution help you recover a lost password?
Would your IT support solution help you recover a lost password?
IT support includes managing passwords.
Whomever you hire as your IT supportpro, he needs a proactive solution that manages your passwords. If you forget one, a simple phone call should help you recover. I am sad to report…that is not always the case. I inherited a situation where nobody managed the company’s passwords. The boss thought he could do it himself. Recovering was a costly and…
View On WordPress
0 notes
markgermanos · 7 years
Text
Prepare for the next phishing attacks
Prepare for the next phishing attacks
When it comes to phishing attacks, training is the ultimate protection.
Phishing attacks happen every day. Fake e-mail, aggressive pop-ups and phone calls threatening IRS action confront us all. You and your end users cannot avoid them. You can, however, train them to become suspicious and avoid falling for phishing attacks that take them to fake websites. That’s why Cameron Park Computer…
View On WordPress
0 notes
markgermanos · 7 years
Text
What you should expect from your IT support
What you should expect from your IT support
Your IT support pro has everything working right. Right?
If you’re here, you are probably incurring some pain. Your network is slow. Servers and workstations are unstable. You don’t know how secure you and your  secrets are. This is usually the condition of networks we inherit. We make network systems work for you. We’ve been in the IT support business since 1992 and Microsoft certified since…
View On WordPress
0 notes
markgermanos · 7 years
Text
How to make sure you can trust a website
How to make sure you can trust a website
Can you trust a website?
Before you click a link, add something to a shopping cart and type your credit card number, make sure you can trust that website. Several services exist that let you type in a website name and then see a credibility score. You should do this to vet a website before typing any personal information into an online form.
Also note that sometimes these websites offer prices at…
View On WordPress
0 notes
markgermanos · 7 years
Text
Say NO to Ransomware
Say NO to Ransomware
Do not let ransomware authors win.
Ransomware is all over the news. A few months back, the Wannacry ransomwareknocked out England’s hospitals’ computer networks. Staff told patients if they did not have an emergency, go home. Administrators there ended up giving the ransomware authors 300 Bitcoin dollars to reveal an encryption key that made the computers once again functional. I am advocating…
View On WordPress
0 notes
markgermanos · 7 years
Text
Say NO to 2FA (2-Factor Authentication)
Say NO to 2FA (2-Factor Authentication)
You do not need 2FA (2-factor authentication).
2FA (2-factor authentication) helps improve your security and reduces your chance of becoming an identity theft victim. I have already written here why you should deploy 2FA. In this post, I shall play the Devil’s Advocate. Don’t do it.
What happens if you don’t do it?
2FA increases your security at no additional cost.
Allen does not see things the…
View On WordPress
0 notes