by William Cunningham | Dec 2, 2022 | Internet Security
Introduction Cyber criminals gain access to systems, personal information, and accounts mostly through people. The image of a hacker sitting in the dark attempting to crack encrypted data, or steal your password happens primarily in the movies. In most cases, methods...
by William Cunningham | Oct 2, 2022 | Internet Security
Introduction Many of the emails we receive each day are spam. Some are dangerous and can cause significant harm, such as identity theft, access to online resources, or loss of money. Therefore, you must be diligent in handling emails and learn to recognize malicious...
by William Cunningham | Jun 1, 2022 | Internet Security, Uncategorized
Introduction Cyber threats are constantly increasing, so we must remain diligent in protecting our data and online resources. I have worked in Information technology since the 1980s, and I have seen many problems that could have been avoided, especially within the...
by William Cunningham | Apr 1, 2022 | Internet Security
Introduction A severe vulnerability of using online resources is passwords. Passwords should be strong, and each online resource should have its own unique password. However, people tend to be lax in following basic best practices for passwords, making them more...
by William Cunningham | Oct 1, 2021 | BCWJ, Internet Security
Introduction Cyber security is becoming increasingly important as time goes by. I remember my first experience with a virus in the late 1980s or late 1990s. I was building a Novell Netware server and noticed the words on a blank screen that read something like,...
by William Cunningham | Aug 2, 2021 | BCWJ, Internet Security
Introduction Several years ago, I implemented a disaster recovery plan (DR) for a company, which enabled them to do business as usual during a two-week-long power outage in their area. How was that possible? They purchased a cloud-based email and file storage solution...