Call us : (973) 433-6676 | E-Mail: sales@sterlingrose.com  

Archive

14Jan2020

Passwords’ Brave New World

While passwords need to go away, they won’t disappear overnight. So, we highly recommend you – and the internet world – follow some guidelines from the National Institute of Standards and Technology (NIST) in managing your online presence. For individuals and small businesses, managing hundreds of passwords for all the websites and resources you need
  • 14 Jan, 2020
  • Norman Rosenthal
  • 0 Comments
  • cybersecurity, NIST, password, risk management,
Read more
20Aug2019

Email in Disguise

The trend of getting voicemail messages through email is opening new doors for hackers to enter computer systems. Scammers are using email with spoofed addresses to hack into business operations, such as wiring money. Today’s office environment provides a perfect setup for a hacker: You hit people when they’re juggling multiple tasks, and you come
  • 20 Aug, 2019
  • Norman Rosenthal
  • 0 Comments
  • cybersecurity, data security, email hacked, privacy, security, spam, spoofing, voicemail,
Read more
08Jan2019

How Secure is Cellular Data?

We know public Wi-Fi networks can be unsecured, and we’ve tailored our use to deal with those problems. But now, hacking cellular networks may be a growing danger as more cracking devices and techniques become more available.
  • 8 Jan, 2019
  • Norman Rosenthal
  • 0 Comments
  • 2FA, cellular, cybersecurity, data security, EFF, GSM, Network Security, online security, public wifi, SS7, two-factor authentication,
Read more
13Nov2018

Using Alternatives to Passwords

We have harped…and harped ad infinitum…about having strong passwords simply because those strings of upper- and lower-case letters, numbers and special characters offered the best chances of staying ahead of the hackers. But we’ve always reminded you that something better is needed because the bad guys have a vested interest in developing better systems to
  • 13 Nov, 2018
  • Norman Rosenthal
  • 0 Comments
  • Azure AD Conditional Access, biometrics, cybercrime, cybersecurity, data security, hardware tokens, MFA, Microsoft, multi-factor authentication, one-time codes, online safety, password-less, risk management, strong passwords,
Read more
09Oct2018

Hello, New Security Technology

Passwords are on the verge of becoming extinct, and for many people, the passing of passwords will be like getting rid of a migraine. With the latest Windows 10 major update from Microsoft, your computers and devices may now say “hello” to you to access Microsoft accounts, and additional security measures may now work together
  • 9 Oct, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybersecurity, risk management, security, Windows 10,
Read more
11Sep2018

Refreshing Devices Re-Energizes Them – Up to a Point

Refreshing your computers, peripherals and devices requires you to take a long pause, but in the end, it still might leave you thirsting for better results. If you’re hanging onto old equipment, Tech Data reports a few facts that might make you change your mind. First of all, the report says, some 46 million small
  • 11 Sep, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, Microsoft, new hardware, performance, risk management, small business, win7, Windows 10,
Read more
11Sep2018

Password Agony; No Ecstasy

Passwords are a total pain. Upper- and lower-case letters, numbers and special characters in one password are likely unbreakable over the course of a lifetime. But just to be safe, you’re required to change them periodically – without repeating one you’ve previously used for a website. And if you go to extremes, well, it is
  • 11 Sep, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, online safety, privacy, risk management, security, spoofing, strong passwords,
Read more
14Aug2018

Airports, Wi-Fi and VPNs

Since most of us fly in and out of Newark Liberty International Airport, you might want to know that it’s ranked fifth on one list of airports where your phone is mostly likely to be hacked. Setting up a VPN (virtual private network) might not be your answer, either, because they are not always as
  • 14 Aug, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, online safety, privacy, risk management, security,
Read more
12Jun2018

IoT and the Fourth Industrial Revolution

At a recent technology conference in Las Vegas, I was overwhelmed by how far technology has advanced in such a short time – and by how much faster the impact of technology on our lives will grow. We are in the Fourth Industrial Revolution. Where are we headed? We’re headed for the clouds – the
  • 12 Jun, 2018
  • Norman Rosenthal
  • 0 Comments
  • cloud computing, cybercrime, cybersecurity, data security, IoT, risk management, security,
Read more
12Jun2018

Advice from the FBI

If you’re a longtime client or reader of Technology Update, you can say the FBI has either listened to us or validated us with its recent call to restart your routers. Our national law enforcement agency says that routers can be vulnerable to hackers, and one of your best defenses is to restart them. There’s
  • 12 Jun, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, Malware, online safety, privacy, risk management, security,
Read more
Older Posts >>