Geek Girls News
The latest on cyber security, computer support and small business IT from one of New Jersey and New York’s top managed IT service providers.Why We Don’t Let Users Choose Their Own Passwords, and How to Make it Easy to Enter Your Passwords Anyway
Here's a scenario many of our users experience. We set up a new email or Windows login, and we securely send you ("you" in this case is the user) your password. It's an ugly password. Too many random letters and numbers. You want to replace it with that...
From the Times: Global Chip Shortage Is Making Industries Sweat
Due to the critical chip shortage caused by the pandemic, we advise placing your new hardware orders as early as possible. Rising chip prices mean we should all expect to pay more for servers, desktops and laptops for the foreseeable future....
From NCSC: The Rise of Ransomware – Company is Attacked by the Same Hackers TWICE!
This blog post from Britain’s National Cyber Security Centre discusses why, when it comes to a ransomware attack, it’s critical to treat the cause, not just the symptoms. A victim of a ransomware attack paid cyber criminals millions to restore their data. They were...
From Krebs on Security – Whistleblower: Ubiquiti Breach “Catastrophic”
When the devices you manufacture are cloud-managed, the last thing you want is for your customers’ login credentials to be breached. The second to last thing you want is to lie about the breach. As the article notes,” If you have Ubiquiti devices installed and haven’t...
From Ars Technica: New malware found on 30,000 Macs
As this interesting article points out, this malware "shows that macOS malware is becoming ever more pervasive and commonplace, despite Apple’s best efforts.” New malware found on 30,000 Macs It's more important than ever not to be complacent about Mac security. Ask...
Free Guide from Duo Security: How to Secure Remote Access
Our partner Duo MFA offers this guide on how to secure remote access for your users: The Essential Guide to Securing Remote Access The guide explains How the work-from-home explosion that started in early 2020 is driving the need to secure remote access Specific types...
When You Want to Protect and Secure your Business, the Whole is Better Than the Sum of the Parts
Keeping your business safe, secure and protected is complex and challenging, not to mention time-consuming. If you have a physical office, you’ve got to keep unwanted visitors and threats off your network and away from your data. You’ve got users who might click on...
G Suite is now Google Workspace
G Suite is rebranding as Google Workspace. According to Google's notification in the subscription and billing section of your G Suite admin account: We're also rolling out new subscription options to give you more choices to fit your needs. You don’t have to change...
From the NY Times: Lost Passwords Lock Millionaires Out of Their Bitcoin Fortunes
This article might encourage you to employ a secure, reliable way to store your passwords, even if you don't own millions of dollars in Bit Coin. Password apps such as Roboform and OnePass are very useful for protecting your passwords. They also allow you to create...
From ITProPortal: Fake Cisco switches may have infiltrated hundreds of businesses
This article demonstrates why it's important to buy your network devices from a reliable retailer, rather than looking for the lowest price on a large "marketplace" site. Fake devices present security breaches and vulnerabilities that can put your company's cyber...







