Call us : (973) 433-6676 | E-Mail: sales@sterlingrose.com  

Archive

14Jul2020

Strengthen Your Security

We’re probably as normal as we’re going to get with working at home, and that will put more pressure on businesses and employees to step up security. Virtual Private Networks (VPNs) have been around for a while, but we’ve never been completely sold on them. They can give you a false sense of security. As
  • 14 Jul, 2020
  • Norman Rosenthal
  • 0 Comments
  • authentication app, business-grade VPN, data security, Network Security, two-factor authentication, Wi-Fi connectivity,
Read more
14Apr2020

Home Remodeling – Technology Style

Homes were caught short when everybody had to stay home to work, learn and entertain themselves. Wi-Fi networks and the internet had to carry much more traffic, and the rapid rise of new technology needs created holes for hackers to tunnel into systems. Here’s what you need to do. First, shore up your security. Treat
  • 14 Apr, 2020
  • Norman Rosenthal
  • 0 Comments
  • cable internet, data security, WiFi,
Read more
14Jan2020

What Are Your Biggest Online Threats in 2020?

Cyberthreats will be coming at you – and any person or organization with whom you have an online relationship – with increasing speed and sophistication. For some, it might feel like you’re living inside an online fantasy game, but it’s real life. Here’s what to look for. Phishing and Social Engineering There’s nothing new about
  • 14 Jan, 2020
  • Norman Rosenthal
  • 0 Comments
  • data security, information theft, IoT, online security, phishing, ransomeware, social engineering,
Read more
10Dec2019

7-bit#, 7-bit#-not PW123 – A Password Primer

This headline depicts how passwords are written and stored in your computing environment. We won’t go into heavy details, but it essentially works this way. When you put letters – upper and lower case – and numerals and special characters into your password, the storage system records them in a code involving 7 bits and
  • 10 Dec, 2019
  • Norman Rosenthal
  • 0 Comments
  • best practices, data security, online security, secure password,
Read more
20Aug2019

Email in Disguise

The trend of getting voicemail messages through email is opening new doors for hackers to enter computer systems. Scammers are using email with spoofed addresses to hack into business operations, such as wiring money. Today’s office environment provides a perfect setup for a hacker: You hit people when they’re juggling multiple tasks, and you come
  • 20 Aug, 2019
  • Norman Rosenthal
  • 0 Comments
  • cybersecurity, data security, email hacked, privacy, security, spam, spoofing, voicemail,
Read more
12Mar2019

Password Problems Revisited

To take our discussion of vanishing passwords one step farther, some recent service calls for clients who’ve been hacked – some multiple times – have provided still more reasons to move on to newer technologies. We are getting numerous calls from clients to help them set up Dashlane, including one client who has been hacked
  • 12 Mar, 2019
  • Norman Rosenthal
  • 0 Comments
  • biometrics, data security, Network Security, password manager, strong passwords,
Read more
08Jan2019

How Secure is Cellular Data?

We know public Wi-Fi networks can be unsecured, and we’ve tailored our use to deal with those problems. But now, hacking cellular networks may be a growing danger as more cracking devices and techniques become more available.
  • 8 Jan, 2019
  • Norman Rosenthal
  • 0 Comments
  • 2FA, cellular, cybersecurity, data security, EFF, GSM, Network Security, online security, public wifi, SS7, two-factor authentication,
Read more
13Nov2018

Using Alternatives to Passwords

We have harped…and harped ad infinitum…about having strong passwords simply because those strings of upper- and lower-case letters, numbers and special characters offered the best chances of staying ahead of the hackers. But we’ve always reminded you that something better is needed because the bad guys have a vested interest in developing better systems to
  • 13 Nov, 2018
  • Norman Rosenthal
  • 0 Comments
  • Azure AD Conditional Access, biometrics, cybercrime, cybersecurity, data security, hardware tokens, MFA, Microsoft, multi-factor authentication, one-time codes, online safety, password-less, risk management, strong passwords,
Read more
13Nov2018

Hack Attack Continues vs. Businesses and People

While government-sponsored hacking and disinformation makes big news, don’t take your eye your eye off the ball when it comes to protecting your personal and corporate data. A report from a consulting firm, Positive Technologies, painted a dark, dark picture, saying the second quarter of 2018 showed a 47 percent increase over 2017. You need
  • 13 Nov, 2018
  • Norman Rosenthal
  • 0 Comments
  • credential compromise, data security, DDoS, hacking, Malware, online safety, risk management, security, social engineering, web attacks,
Read more
11Sep2018

Refreshing Devices Re-Energizes Them – Up to a Point

Refreshing your computers, peripherals and devices requires you to take a long pause, but in the end, it still might leave you thirsting for better results. If you’re hanging onto old equipment, Tech Data reports a few facts that might make you change your mind. First of all, the report says, some 46 million small
  • 11 Sep, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, Microsoft, new hardware, performance, risk management, small business, win7, Windows 10,
Read more
Older Posts >>