The US National Institute of Standards and Technology (NIST) has some surprising recommendations that might prompt you to rethink your business’s password policies. Learn why change is needed and what NIST is recommending that companies do.
It’s time for a pop quiz. Is the following statement true or false?
It is best for businesses to require that employees create long, random passwords that include mixed-case letters, numbers, and symbols.
For a long time, the prevailing belief was that this statement was true, so many companies included composition rules in their password policies. However, the US National Institute of Standards and Technology (NIST) now believes these rules are hurting rather than helping businesses.
In March 2018, the SamSam ransomware ravaged Atlanta’s computer systems, bringing many city services to a halt. This wasn’t the first time hackers used this ransomware to wreak havoc and it won’t be the last. Learn how SamSam differs from most other ransomware.
Many city workers and citizens in Atlanta, Georgia, won’t soon forget March 22, 2018. On that day ransomware shut down many of the city’s online services and even some government offices. The culprit was a ransomware variant known as SamSam.
This was not the first time SamSam struck in 2018. In February, it forced the Colorado Department of Transportation to shut down 2,000 computers. A month earlier, SamSam stopped city services in Farmington, New Mexico as well as halted healthcare systems at Adams Memorial Hospital and Hancock Health in Indiana.
Digital con artists have devised a new way to scare people into falling for a tech support scam. Learn how this scam works and what to do if you encounter it.
A new tech support scam has surfaced. Digital con artists are freezing web browsers in hope that users will panic and call a bogus support line for assistance. The scam has been seen on Google Chrome, Mozilla Firefox, and Brave web browsers running on Windows devices.
Using older tech devices saves money, but there is a point at which it can hurt business operations. Here are four signs that it might be time to update or replace some tech devices.
Small and midsized businesses usually have limited tech budgets, so it’s common for them to continue using their devices as long as possible. However, there is a point at which outdated tech devices become a burden and hurt business operations.
Most of the computing devices in use today have two security vulnerabilities in their chips. Learn how this situation evolved, why you should be concerned, and what you can do to protect your business’s devices.
“I need it now” is a common mindset, especially when it comes to computing devices. People want apps to respond immediately, web pages to load quickly, and messages to be delivered instantly.