Reconnaissance is a common tactic to lay
The tactics of hackers have evolved over the past few years. As businesses wised up and deployed better data backup systems, hackers have changed their tactics to include a secondary means of extortion, namely, the threat to release exfiltrated data.
The Cybersecurity Threat Landscape continues to grow more ominous by the day. The year 2021 was peppered with several high-profile breach incidents. Perhaps more significant was the dramatic uptick in breach incidents that failed to make the evening news.
Much has been written recently regarding a new paradigm in cybersecurity defense, namely, the “Assume Breach” posture. We at Thom Infotech feel that this paradigm is worthy of consideration What is the “Assume Breach” Paradigm? Loosely defined, the “Assume Breach” paradigm anticipates that attackers will eventually breach the perimeter. With this in mind, a “what […]
If you were choosing a new accounting system today, would it be your current one? (Today’s entry is a guest post by our friends at DataQuest) Let’s face it- there are many reasons why we stay with business tools that aren’t that great. And putting up with the status quo can work up to a […]
The warnings have been dire – YOU MUST UPGRADE TO WINDOWS 10! Is that really true? Are Microsoft, computer manufacturers, and computer resellers just making it all up? Let’s rewind a bit. Every operating system has an expiration date. After many stays of execution, Windows XP was finally dropped from support in June of 2014. […]
Windows 7 has been a very successful operating system since its release on October 22nd, 2009. Most users skipped over Windows 8 and Windows 8.1, finding Windows 7 to be trustworthy and reliable. But after a great 10-year run, Microsoft is calling it quits and support for Windows 7 is nearing the end. Everyone needs […]
Nearly all of our online activities require passwords. You might be using the same password everywhere, but this is a terrible idea. Instead, consider a password manager.
Phishing is the practice of sending emails designed to trick recipients into providing sensitive information. If you have fallen victim to a phishing attack, this post is for you.
1/24/2018 Update: Intel has validated our “wait & see” strategy with their updated response to this issue. They are now recommending that users refrain from installing the previously released updates due to reported issues that need to be investigated. Here is their statement: We have now identified the root cause of the reboot issue impacting […]