Call us : (973) 433-6676 | E-Mail: sales@sterlingrose.com  

Archive

13Nov2018

Using Alternatives to Passwords

We have harped…and harped ad infinitum…about having strong passwords simply because those strings of upper- and lower-case letters, numbers and special characters offered the best chances of staying ahead of the hackers. But we’ve always reminded you that something better is needed because the bad guys have a vested interest in developing better systems to
  • 13 Nov, 2018
  • Norman Rosenthal
  • 0 Comments
  • Azure AD Conditional Access, biometrics, cybercrime, cybersecurity, data security, hardware tokens, MFA, Microsoft, multi-factor authentication, one-time codes, online safety, password-less, risk management, strong passwords,
Read more
11Sep2018

Refreshing Devices Re-Energizes Them – Up to a Point

Refreshing your computers, peripherals and devices requires you to take a long pause, but in the end, it still might leave you thirsting for better results. If you’re hanging onto old equipment, Tech Data reports a few facts that might make you change your mind. First of all, the report says, some 46 million small
  • 11 Sep, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, Microsoft, new hardware, performance, risk management, small business, win7, Windows 10,
Read more
11Sep2018

Password Agony; No Ecstasy

Passwords are a total pain. Upper- and lower-case letters, numbers and special characters in one password are likely unbreakable over the course of a lifetime. But just to be safe, you’re required to change them periodically – without repeating one you’ve previously used for a website. And if you go to extremes, well, it is
  • 11 Sep, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, online safety, privacy, risk management, security, spoofing, strong passwords,
Read more
14Aug2018

Airports, Wi-Fi and VPNs

Since most of us fly in and out of Newark Liberty International Airport, you might want to know that it’s ranked fifth on one list of airports where your phone is mostly likely to be hacked. Setting up a VPN (virtual private network) might not be your answer, either, because they are not always as
  • 14 Aug, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, online safety, privacy, risk management, security,
Read more
12Jun2018

IoT and the Fourth Industrial Revolution

At a recent technology conference in Las Vegas, I was overwhelmed by how far technology has advanced in such a short time – and by how much faster the impact of technology on our lives will grow. We are in the Fourth Industrial Revolution. Where are we headed? We’re headed for the clouds – the
  • 12 Jun, 2018
  • Norman Rosenthal
  • 0 Comments
  • cloud computing, cybercrime, cybersecurity, data security, IoT, risk management, security,
Read more
12Jun2018

Advice from the FBI

If you’re a longtime client or reader of Technology Update, you can say the FBI has either listened to us or validated us with its recent call to restart your routers. Our national law enforcement agency says that routers can be vulnerable to hackers, and one of your best defenses is to restart them. There’s
  • 12 Jun, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, Malware, online safety, privacy, risk management, security,
Read more
08May2018

Who Really Sent That Email?

We’re seeing a pattern in security problems caused by “fake emails.” Although the pattern is not restricted to business emails, they seem to show up more frequently in offices. Here’s what’s happening. Just like good marketers, email spoofers and hackers have noticed that Wednesdays and Thursdays are “light days” for email traffic. If someone who’s
  • 8 May, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, Malware, online safety, risk management, spoofing,
Read more
10Apr2018

The Not-So-Hidden Costs of Free Apps

Facebook is free. You can get a free Starbucks app that gives you savings. You can use any number of free navigation apps, such as Waze or Google Maps. They may be free of fees, but they have costs, but they have costs, and that may be at the practical heart of privacy. Our purpose
  • 10 Apr, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, free apps, Malware, online safety, privacy,
Read more
10Apr2018

Don’t Go to the Dark (Web) Side

The story of the hacking frenzy would be incomplete without mentioning the dark web. Some adventurous souls might think they can just drop in for a quick visit to see what’s it like and leave, but two thoughts come to mind: Trying to leave the Hotel California and a lamb sauntering into a lions’ den.
  • 10 Apr, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, Malware, online safety, privacy, risk management,
Read more
10Apr2018

Spoofs and Email Management

Spoofing email addresses is so common that you might as well accept the fact that you have to scrutinize every message you get. With our switch to a new Office 365 management portal, many clients have been getting emails allegedly from Microsoft, and some are more obvious spoofs than others. It might be time to
  • 10 Apr, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, Malware, online safety, privacy, risk management, spoofing,
Read more
Older Posts >>