Call us : (973) 433-6676 | E-Mail: sales@sterlingrose.com  

Archive

09Jul2019

Who’s in Your Electronic Wallet?

Complacency is likely to be the greatest threat to your online security. The FBI recently reported that the padlock icon and HTTPS:// in a website cannot be trusted all the time in letting you know a site is safe. With the cost of SSL-TSL certificates falling, it’s cheap for crooks to set up malware sites
  • 9 Jul, 2019
  • Norman Rosenthal
  • 0 Comments
  • anti-virus, fbi, https:, Malware, online safety, secure sites, security, ssl, Symantec, tsl,
Read more
13Nov2018

Hack Attack Continues vs. Businesses and People

While government-sponsored hacking and disinformation makes big news, don’t take your eye your eye off the ball when it comes to protecting your personal and corporate data. A report from a consulting firm, Positive Technologies, painted a dark, dark picture, saying the second quarter of 2018 showed a 47 percent increase over 2017. You need
  • 13 Nov, 2018
  • Norman Rosenthal
  • 0 Comments
  • credential compromise, data security, DDoS, hacking, Malware, online safety, risk management, security, social engineering, web attacks,
Read more
12Jun2018

Advice from the FBI

If you’re a longtime client or reader of Technology Update, you can say the FBI has either listened to us or validated us with its recent call to restart your routers. Our national law enforcement agency says that routers can be vulnerable to hackers, and one of your best defenses is to restart them. There’s
  • 12 Jun, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, Malware, online safety, privacy, risk management, security,
Read more
08May2018

Who Really Sent That Email?

We’re seeing a pattern in security problems caused by “fake emails.” Although the pattern is not restricted to business emails, they seem to show up more frequently in offices. Here’s what’s happening. Just like good marketers, email spoofers and hackers have noticed that Wednesdays and Thursdays are “light days” for email traffic. If someone who’s
  • 8 May, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, Malware, online safety, risk management, spoofing,
Read more
10Apr2018

The Not-So-Hidden Costs of Free Apps

Facebook is free. You can get a free Starbucks app that gives you savings. You can use any number of free navigation apps, such as Waze or Google Maps. They may be free of fees, but they have costs, but they have costs, and that may be at the practical heart of privacy. Our purpose
  • 10 Apr, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, free apps, Malware, online safety, privacy,
Read more
10Apr2018

Don’t Go to the Dark (Web) Side

The story of the hacking frenzy would be incomplete without mentioning the dark web. Some adventurous souls might think they can just drop in for a quick visit to see what’s it like and leave, but two thoughts come to mind: Trying to leave the Hotel California and a lamb sauntering into a lions’ den.
  • 10 Apr, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, Malware, online safety, privacy, risk management,
Read more
10Apr2018

Spoofs and Email Management

Spoofing email addresses is so common that you might as well accept the fact that you have to scrutinize every message you get. With our switch to a new Office 365 management portal, many clients have been getting emails allegedly from Microsoft, and some are more obvious spoofs than others. It might be time to
  • 10 Apr, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, Malware, online safety, privacy, risk management, spoofing,
Read more
28Mar2017

Cybersecurity Scorecard

Cybersecurity has dominated our conversation for the past year, and a report from SonicWall, which provides security tools worldwide for networks to email and everything in between, shows where we’re making progress and where new threats lie. First, the good news. In data gathered in the past year from the SonicWall Global Response Intelligent Defense
  • 28 Mar, 2017
  • Norman Rosenthal
  • 0 Comments
  • Android, cybercrime, cybersecurity, data security, exploit, exploits, Google, GRID, IoT, Malware, risk management, SonicWall, ssl, ttl,
Read more
10Jan2017

Don’t Wait When Hacked

A client got hacked at 5 p.m. and discovered it at 8 p.m. They waited until the next morning to call us. Our advice to them was to shut down their system. Our advice to you is don’t wait – but please use some common sense. We don’t appreciate calls at 5:30 in the morning
  • 10 Jan, 2017
  • Norman Rosenthal
  • 0 Comments
  • compromised, data security, hacked, Malware, online safety, privacy, risk management, spoofing, trojan,
Read more
13Dec2016

Smarten Up! The Spoof is On

I was at a client’s office when the email – to her as president of a service organization – arrived, asking for a wire transfer of money. Other members of the organization got the same message, and some actually sent money. A scammer had spoofed a name or email address that was recognizable. This is
  • 13 Dec, 2016
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, data security, fraud, hostageware, Malware, online safety, risk management, scam, spoof, uce,
Read more
Older Posts >>