November 2016

Funny Phishing Story: Your Online Order Receipt Funny Phishing Story: Your Online Order Receipt
Hi, I wanted to share with you a funny story….  My boss calls me into her office, very serious like.  She sits me down and asks “Did you use the company credit card without authorization?” I am very confused, although I have access, I would not order anything without asking.  I ...
Read More »

July 2016

There Is A Nasty New MBR & File Encryption Ransomware Strain There Is A Nasty New MBR & File Encryption Ransomware Strain
There is a new ransomware strain called "Satana" (the reference is clear, just take the last "a" off) which is a blend between classic file encryption malware and the Petya strain which locks the Master Boot Record (MBR).  This looks like a Petya copycat, but for each encrypted file, Satana ...
Read More »
Can Two-Factor Authentication Actually Fail? Can Two-Factor Authentication Actually Fail?
You’ve probably read many times that two-factor authentication is a superb extra layer of protection against a thief hacking into your accounts, because gaining access requires entering a One Time Passcode (OTP)—sent via text or voice—into a login field. In other words, no phone, no access. But CAN a hacker ...
Read More »

January 2016

Pay Attention to Your IoT Device Security Pay Attention to Your IoT Device Security
Wow cool! A device that lets you know, via Internet, when your milk is beginning to sour! And a connected thermostat—turning the heat up remotely an hour before you get home to save money…and “smart” fitness monitors, baby monitors, watches… Slow down. Don’t buy a single smart device until you ...
Read More »
How to Unsend or Cancel an E-mail How to Unsend or Cancel an E-mail
If the person you are sending an e-mail to pretty much instantaneously receives it, how on earth can you unsend or cancel it? Well, you have several options. Criptext This is a browser plug-in that works for Chrome and Safari. Your message including attachments ...
Read More »

July 2015

How to Avoid Bad Apps How to Avoid Bad Apps
If you think there’s like a million apps out there, that’s not exactly an exaggeration. For sure, there are more than you can imagine, which makes it easy to conceive that many certainly come with security problems. In fact, out of the top 25 most popular apps, 18 of them ...
Read More »

June 2015

How to plan for Digital Disasters How to plan for Digital Disasters
In this day and age, we should never hear someone proclaim, “Oh my God, my computer crashed! I lost everything!” You can’t lose something that’s been properly backed up. So many people, including ones with businesses that rely upon cyber communication, continue to avoid backing up their digital data. Nobody is ...
Read More »

May 2015

What is a Remote Administration Tool (RAT)? What is a Remote Administration Tool (RAT)?
Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I smell a rat. Literally, a RAT. A RAT or remote administration tool, is software that gives a person full control a tech device, remotely. The RAT gives the user access ...
Read More »
Bank Account Depleted, Company Sues Bank Account Depleted, Company Sues
Is it Bank of America’s fault that a hospital was hacked and lost over a million dollars? Chelan County Hospital No. 1 certainly thinks so, reports an article on krebsonsecurity.com. In 2013, the payroll accounts of the Washington hospital were broken into via cyberspace. Bank of America got back about ...
Read More »

Interested in submitting content for publication and syndication on the IT Specialist Network?

As a contributing writer on the IT Specialist Network, you can quickly gain exposure as an opinion leader or subject matter expert in information technology by informing a large audience of technical professionals. We welcome new and established authors that specialize in one or more sectors of the IT industry. Once your article(s) is approved for publication, it will be selectively syndicated throughout the IT Specialist Network.

Click here to contact us.


Thought Leadership

A thought leader is an individual or firm that prospects, clients, referral sources, intermediaries and even competitors recognize as one of the foremost authorities in selected areas of specialization, resulting in its being the go-to individual or organization for said expertise.Leadership Blog Forbes (2012)

Follow Us

More Info

Hey!

You haven't signed in yet. Sign in below to access all of our great content.

You can also Register using the button below.

Subscribe

  • Published by IT Specialist Network