Reconnaissance is a common tactic to lay
The tactics of hackers have evolved over the past few years. As businesses wised up and deployed better data backup systems, hackers have changed their tactics to include a secondary means of extortion, namely, the threat to release exfiltrated data.
The Cybersecurity Threat Landscape continues to grow more ominous by the day. The year 2021 was peppered with several high-profile breach incidents. Perhaps more significant was the dramatic uptick in breach incidents that failed to make the evening news.
Much has been written recently regarding a new paradigm in cybersecurity defense, namely, the “Assume Breach” posture. We at Thom Infotech feel that this paradigm is worthy of consideration What is the “Assume Breach” Paradigm? Loosely defined, the “Assume Breach” paradigm anticipates that attackers will eventually breach the perimeter. With this in mind, a “what […]
The warnings have been dire – YOU MUST UPGRADE TO WINDOWS 10! Is that really true? Are Microsoft, computer manufacturers, and computer resellers just making it all up? Let’s rewind a bit. Every operating system has an expiration date. After many stays of execution, Windows XP was finally dropped from support in June of 2014. […]
Windows 7 has been a very successful operating system since its release on October 22nd, 2009. Most users skipped over Windows 8 and Windows 8.1, finding Windows 7 to be trustworthy and reliable. But after a great 10-year run, Microsoft is calling it quits and support for Windows 7 is nearing the end. Everyone needs […]
Yahoo email has experienced yet another security breach by hackers. Should you be worried about this? Even if you do not currently have a Yahoo email address, it is my opinion that you still need to be concerned. Email account hacking has been a recurring theme for Yahoo in recent years and the timing couldn’t be worse. Yahoo has […]
Is it Time to Outsource Your Computer Support? Many businesses are beginning to reach that conclusion. “prevention is better than cure” -Erasmus Setting up a small business computer network used to be a relatively simple affair. A small business owner merely needed a few computers, an internet connection with a cable or DSL modem, some […]
Is your business in a high-crime area? Many business owners eventually face the choice of locating (or relocating) a business, and one of the key features they consider is the criminal reputation of the prospective commercial office neighborhood. This is for good reason. Making a poor choice could result in frequent business disruptions, the inability […]
I recently had a chat with a colleague who recounted his recent experience with a computer he recovered from a local electronics recycling center. His story was a bit shocking and I thought it really deserved a write-up. Electronics waste is a huge burden to local governments around the world. The pace of advancement in […]