Posts

Image
Consider using “multi-factor authentication” – This phrase means you should use more than one method to verify the identity of a user wishing to gain access to private information resources.  Multi-factor authentication is a more rigorous way to provide computer security. An example would be requiring a user to select a complex password as well as a randomly generated number (e.g. from a service like Good Authenticate) or a biometric factor such as a fingerprint. Other methods would include requiring the entry of a randomly generated access code.  For more information check out  www.computer-security-glossary.org          A Story about How Computers Were First  Used for War

21 Ways You Can Fight Cybercrime

Image
Are you worried about the growing threat from cybercrime?  I am. The problem continues to grow worse. The losses due to cybercrime now exceed the amount of money being made in the illegal global drug trade (i.e. 1.5 trillion dollars). The number is dramatically increasing and projected to grow beyond six trillion dollars by the end of 2021. You increasingly have to fight off cyber criminals who are focused on stealing from you.  Law enforcement can do very little to help protect you.   Why do we find ourselves in this situation? First, cybercrime is a low-risk high pay off criminal activity. Second, the Internet is an easy target that wasn’t built for security. Third, the number of today’s interconnected devices and the power of computing devices is dramatically increasing. And fourth, attacks are becoming more targeted and sophisticated.    Everyone is a target.  We must raise our level of security awareness and take proactive steps to protect our private ...