Protecting small firms from computer disasters
Cart 0

Blog — vulnerabilities

Real Defense against Lightning

protection vulnerabilities

Real Defense against Lightning

Lightning can go right through power strips and uninterruptible power supplies, destroying your computers and appliances. On average the risk is 1 in 8.5 that a house will be struck one or more times in 25 years. Installing a whole house surge protector ...

Read more →


2FA Hacked - Backups Even More Critical

cybersecurity vulnerabilities

2FA Hacked - Backups Even More Critical

Two-Factor Authentication (2FA) is designed to protect you by sending you a text message or calling you when you are logging into a website. A new hacker trick can defeat 2FA.

Read more →


New Computer Flaws Discovered

cybersecurity vulnerabilities

New Computer Flaws Discovered

Newly discovered flaws allow attackers with access to a computer the ability to bypass passwords and read protected data.

Read more →


WiFi Flaw Can Breach Your Internet Connection

cybersecurity vulnerabilities

WiFi Flaw Can Breach Your Internet Connection

Hackers can eavesdrop on your computer use, intercepting passwords and dropping ransomware onto your device if you use WiFi. A flaw called KRACK Attack was recently discovered by a Belgian security researcher. https://www.krackattacks.com It defeats the WPA2 encryption scheme of supposedly secure, password-protected WiFi access points (hotspots).You should continue to use passwords for our WiFi connections but cannot assume you are safe until you apply updates to your devices. UPDATE:  For information on fixes that stop KRACK from letting hackers intercept what you send and receive over WiFi, see: KRACK Attack Threatens All Wi-Fi Networks: What to Do  To limit...

Read more →


World Not Ready for this Cyberattack

cybersecurity vulnerabilities

World Not Ready for this Cyberattack

"This is different," said Ben-Oni. "It's a lot worse. It steals credentials..."

Read more →