Call us : (973) 433-6676 | E-Mail: sales@sterlingrose.com  

Archive

11Feb2020

Home is Where the Hack Is

Don’t think your home is too small to be a hacker’s target. The recent invasion of a young girl’s bedroom through a camera system has sparked a lawsuit and some hot discussion about who’s at fault. Ultimately, you need to make you cover all the bases, and the Department of Homeland Security offers some help
  • 11 Feb, 2020
  • Norman Rosenthal
  • 0 Comments
  • backup, data secutiry, defualt password, hacker, IoT, privacy, security, security patches, update,
Read more
20Aug2019

Email in Disguise

The trend of getting voicemail messages through email is opening new doors for hackers to enter computer systems. Scammers are using email with spoofed addresses to hack into business operations, such as wiring money. Today’s office environment provides a perfect setup for a hacker: You hit people when they’re juggling multiple tasks, and you come
  • 20 Aug, 2019
  • Norman Rosenthal
  • 0 Comments
  • cybersecurity, data security, email hacked, privacy, security, spam, spoofing, voicemail,
Read more
12Feb2019

Inside the World of Updates

Facetime updates got a lot of face time recently with all the reports about how a 14-year-old discovered a bug that left a mic open even if a recipient didn’t answer a group Facetime call. It was shocking but not surprising, based on how updates are developed and implemented. Apple, Microsoft, Google and other technology
  • 12 Feb, 2019
  • Norman Rosenthal
  • 0 Comments
  • Apple, bug, facetime, Google, Microsoft, privacy, security, updates,
Read more
11Sep2018

Password Agony; No Ecstasy

Passwords are a total pain. Upper- and lower-case letters, numbers and special characters in one password are likely unbreakable over the course of a lifetime. But just to be safe, you’re required to change them periodically – without repeating one you’ve previously used for a website. And if you go to extremes, well, it is
  • 11 Sep, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, online safety, privacy, risk management, security, spoofing, strong passwords,
Read more
14Aug2018

Airports, Wi-Fi and VPNs

Since most of us fly in and out of Newark Liberty International Airport, you might want to know that it’s ranked fifth on one list of airports where your phone is mostly likely to be hacked. Setting up a VPN (virtual private network) might not be your answer, either, because they are not always as
  • 14 Aug, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, online safety, privacy, risk management, security,
Read more
12Jun2018

Advice from the FBI

If you’re a longtime client or reader of Technology Update, you can say the FBI has either listened to us or validated us with its recent call to restart your routers. Our national law enforcement agency says that routers can be vulnerable to hackers, and one of your best defenses is to restart them. There’s
  • 12 Jun, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, Malware, online safety, privacy, risk management, security,
Read more
10Apr2018

The Not-So-Hidden Costs of Free Apps

Facebook is free. You can get a free Starbucks app that gives you savings. You can use any number of free navigation apps, such as Waze or Google Maps. They may be free of fees, but they have costs, but they have costs, and that may be at the practical heart of privacy. Our purpose
  • 10 Apr, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, free apps, Malware, online safety, privacy,
Read more
10Apr2018

Don’t Go to the Dark (Web) Side

The story of the hacking frenzy would be incomplete without mentioning the dark web. Some adventurous souls might think they can just drop in for a quick visit to see what’s it like and leave, but two thoughts come to mind: Trying to leave the Hotel California and a lamb sauntering into a lions’ den.
  • 10 Apr, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, Malware, online safety, privacy, risk management,
Read more
10Apr2018

Spoofs and Email Management

Spoofing email addresses is so common that you might as well accept the fact that you have to scrutinize every message you get. With our switch to a new Office 365 management portal, many clients have been getting emails allegedly from Microsoft, and some are more obvious spoofs than others. It might be time to
  • 10 Apr, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, Malware, online safety, privacy, risk management, spoofing,
Read more
09Jan2018

Unsecure Security Cameras

As more businesses and homes add security cameras to monitor their premises, hackers are enjoying the view, too. While camera manufacturers can and should secure the backdoors to their systems, there are also steps you can take to protect your property. We’re seeing an uptick in security camera systems being hacked, and one recent incident
  • 9 Jan, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybersecurity, privacy, risk management, security cameras. IoT, Surveillance,
Read more
Older Posts >>