Free Protection Form Ransomware

Ransomware attacks have been growing exponentially making anti-virus companies scramble to keep up with the latest attacks.  One of these companies, Bitdefender, takes a new tactic and makes it available for FREE. The Bitdefender solution makes it appear as though your computer is already infected with current versions of Ransomware. Kind of like a vaccine…

Browser Security

After email the most common source of Malware infections is through your internet browser. So securing your browser is a great way to defend against Malware and protect your privacy. This is the first in a series of tips to help our readers protect themselves. This first tip will focus on general practices. Subsequent tips…

Make Your Bluetooth Safe

For a criminal to break into a Bluetooth device, they must force two paired Bluetooth devices to break their connection, known as Blueballing. For instance the connection between a cellular phone and a Bluetooth enabled headset could be broken allowing the cell phone to be hijacked. One method used to send unwanted files is Bluejacking.…

Use Firewalls

Do not operate computers without using firewalls. A firewall protects a computer, or network, through a series of access control policies separating that computer, or network, from other computers, or networks. There are two types of firewalls: Software firewall – software running on an individual computer Hardware firewall – a dedicated device designed to protect…

Get Antivirus Software

Get antivirus software. Having software to protect your computer against malicious code is a must. There are a lot of antivirus software products on the market. Each company takes a different approach with different methods and implementations of combatting threats. One thing they all do is search the files on your computer by comparing those…

Secure Your Wireless Access Point

Secure your wireless access points. Unsecure wireless access points are the most common vulnerability most home and small business networks have. Very often consumers purchase a wireless access point, either stand alone or integrated into a firewall, plug it in and connect with no configuration. They use the default manufacturer settings. This is a disaster…