TBG Blog Author: keeneyemedia

20May

I recently did a conference at GIPAW. Click here to view the presentation files, and learn everything you need to know about BYOD and High Density Wireless.

Read More

10Jan

The Biggest Cyber Threats for 2013 With the explosive use of tablets and smart phones, 2012 was a busy year for cybercriminals. The leading security experts are warning of more threats coming in 2013. The hottest targets are devices are running the Android operating system . The Android operating system is installed on 70% of […]

Read More

18Dec

Communication Line Redundancy One of the items many of my clients have plans for is Backup for their computer systems, what they don’t always think about it communication line backups. As computer systems are becoming more centralized or moved to some sort of cloud or hosted service, communication lines become much more important. If the […]

Read More

17Dec

With the numerous websites that require passwords, it is tempting to use the same password, don’t. An editor for wired magazine recently had his account compromised, once the hacker figure out his password, he was able to attack additional accounts. What I recommend is to have different passwords that are strong for banking, brokerage and […]

Read More

10Dec

I might have mentioned this before, but I will do it again. OpenDns has a service you can sign up for that will filter out bad websites. If you are at home, you can use it to help protect your children and also to protect your computers from spyware and malware. If you are on […]

Read More

03Dec

How much does it cost to infect 1,000 machines with malware? Russian services will do it for as little as $12. Distributed denial of service (DDoS) attacks, which overwhelm a website with traffic, can be purchased for as little as $10 for a 1-hour attack, Trend Micro says. A one-day attack costs $30 to $70. […]

Read More

26Nov

Privileged accounts have emerged as the primary target for attackers — if you examine some of the most spectacular breaches of the past few years, they all have a privileged connection. Once inside, they elevate privileges to gain access to additional servers, databases, and other high-value systems. Make sure you are assigning the least amount […]

Read More

19Nov

When is the last time you checked who had administrative rights on your domain? This is something I get called in to review, someone was added to the Domain Admins account who should not have and caused issues. My recommendation is to review this group once a month to ensure that people are not in […]

Read More

12Nov

You might think it is cool to post that you are on vacation to Social networking sites, but it is a bad idea. Crooks are looking at social networking and hitting houses when you are gone. Even if you post you are at the mall, it gives them the opportunity to steal from you. If […]

Read More

05Nov

What if someone obtained your password and wiped out your accounts? Does this sound crazy? Well it happened to a writer at Wired magazine.  He had his Google account deleted  and his Apple ID was broken into. They then used that to remotely erase all data on his IPHONE, IPAD and MACBOOK. Make sure you […]

Read More