Never Save Your Work in These Locations

In every job that involves interaction with the public, amusing “Can you believe…” stories about customers abound. They’re often triggered by seemingly reasonable behaviors that experts recognize as problematic. A well-known example from the early days of personal computing is a college student who kept track of his floppy disk by attaching it to his […]

Read more

Businesses, Don’t Overlook Email Backup

Cloud-based email services such as Google Workspace and Microsoft 365 dominate the market for organizational email for good reason. Dealing with the constant onslaught of spam and online attacks is hard, as those traumatized by running mail servers in the “good old days” can attest. While email service providers excel at their primary functions of […]

Read more

When Purchasing a Fireproof Safe, Pay Attention to the Details

The devastating losses caused by the Los Angeles wildfires have underscored the need to protect data from catastrophic events. A traditional offsite backup—periodically moving a hard drive to another location—might not have sufficed in areas affected by wildfires, where many structures were destroyed. An online backup using a service like Backblaze or CrashPlan is often […]

Read more

What to Expect when in Contact with Apple Support

It is increasingly difficult to distinguish between legitimate phone calls and scam phone calls. Scammers use ever more sophisticated deception methods to convince people to reveal personal information such as an account password or credit card details. One example of these sophisticated methods is described in this Krebs On Security article about phone phishing. To … Read more

The Importance of Properly Offboarding Employees

Employers and their employees part ways for all sorts of reasons. People may move on because of a contract’s completion, to take a new job, or because they’re retiring. Employees may also leave due to being laid off or fired. Whatever the reason, offboarding—the process of managing an employee’s departure from an organization—is essential. Without […]

Read more

Perturbed by Location Tracking Revelations? Here’s How to Protect Yourself

Recent news reports have revealed that a little-known company called Babel Street can track iPhone and Android user locations. Babel Street does this by leveraging data from mobile advertising data brokers. Investigators from data removal firm Atlas Privacy discovered they could use Babel Street’s Locate X tool to identify patients at a Florida abortion clinic, […]

Read more

Passwords Becomes a Real App in macOS 15 Sequoia, iOS 18, and iPadOS 18

Although we’re still fans of 1Password, and there are plenty of other good password managers out there, like BitWarden and Dashlane, Apple has finally removed the last hurdle to using its built-in password management capabilities. Starting in macOS 15 Sequoia, iOS 18, iPadOS 18, and visionOS 2, Passwords is now a real app rather than […]

Read more

Set macOS to Require a Password after Screen Saver Start or Display Sleep

Although paying attention to online security is of primary importance, don’t forget local security. You don’t want to go out for lunch and let someone wandering by your office poke through your email, messages, photos, and private files. To ensure this doesn’t happen, set your Mac to start the screen saver or sleep the display […]

Read more

No More Ransom Website Offers Ransomware Decryption Tools

We’ve written in the past about how Apple-only companies can protect themselves from ransomware (strong security, isolated backups, monitoring software), but realistically, it’s primarily a threat to computers running Windows and Linux. If you, or anyone you know, is targeted by ransomware, look to the No More Ransom website, developed by Europol’s European Cybercrime Centre […]

Read more

NPD Breach Reveals Data on Hundreds of Millions, Here’s How to Respond

A few months ago, news broke about the latest massive data breach, this time from a company called National Public Data, a company that collects vast amounts of personal data about individuals from public data sources, including addresses, employment history, criminal records, and Social Security numbers. NPD then sells access to that data to employers […]

Read more

Protect Domains That Don’t Send Email from Email Spoofing

We recently wrote an article for those who manage their own Internet domain names about using SPF, DKIM, and DMARC to prevent your domains from being used in phishing attacks and enhance the deliverability of legitimate email. But what about other domains you own but don’t use for email? To make phishing attacks more believable, […]

Read more