Call us : (973) 433-6676 | E-Mail: sales@sterlingrose.com  

Archive

11Feb2020

Home is Where the Hack Is

Don’t think your home is too small to be a hacker’s target. The recent invasion of a young girl’s bedroom through a camera system has sparked a lawsuit and some hot discussion about who’s at fault. Ultimately, you need to make you cover all the bases, and the Department of Homeland Security offers some help
  • 11 Feb, 2020
  • Norman Rosenthal
  • 0 Comments
  • backup, data secutiry, defualt password, hacker, IoT, privacy, security, security patches, update,
Read more
20Aug2019

Email in Disguise

The trend of getting voicemail messages through email is opening new doors for hackers to enter computer systems. Scammers are using email with spoofed addresses to hack into business operations, such as wiring money. Today’s office environment provides a perfect setup for a hacker: You hit people when they’re juggling multiple tasks, and you come
  • 20 Aug, 2019
  • Norman Rosenthal
  • 0 Comments
  • cybersecurity, data security, email hacked, privacy, security, spam, spoofing, voicemail,
Read more
20Aug2019

Who’s Your Office 365 Partner?

As an Office 365 administrative partner for almost all of our clients, we have extraordinary access to your systems – and a huge responsibility. You depend on our honesty and competency to keep your systems running and protect you from breaches. Some of our colleagues are not as good about this. Microsoft finally provided some
  • 20 Aug, 2019
  • Norman Rosenthal
  • 0 Comments
  • 2FA, Microsoft, Network Security, Office 365, security, two-factor authentication,
Read more
09Jul2019

Who’s in Your Electronic Wallet?

Complacency is likely to be the greatest threat to your online security. The FBI recently reported that the padlock icon and HTTPS:// in a website cannot be trusted all the time in letting you know a site is safe. With the cost of SSL-TSL certificates falling, it’s cheap for crooks to set up malware sites
  • 9 Jul, 2019
  • Norman Rosenthal
  • 0 Comments
  • anti-virus, fbi, https:, Malware, online safety, secure sites, security, ssl, Symantec, tsl,
Read more
12Mar2019

Security and On/Off Wi-Fi

We’re seeing more Ring doorbells. They offer you the ability to monitor your door from anywhere through the internet and your Wi-Fi network. But some clients have told us they don’t want their network on at all times because of radio frequency waves. We don’t share some people’s concerns about damage from radio waves. We
  • 12 Mar, 2019
  • Norman Rosenthal
  • 0 Comments
  • IoT, security, security cameras. IoT, video doorbell, WiFi,
Read more
12Feb2019

Inside the World of Updates

Facetime updates got a lot of face time recently with all the reports about how a 14-year-old discovered a bug that left a mic open even if a recipient didn’t answer a group Facetime call. It was shocking but not surprising, based on how updates are developed and implemented. Apple, Microsoft, Google and other technology
  • 12 Feb, 2019
  • Norman Rosenthal
  • 0 Comments
  • Apple, bug, facetime, Google, Microsoft, privacy, security, updates,
Read more
13Nov2018

Hack Attack Continues vs. Businesses and People

While government-sponsored hacking and disinformation makes big news, don’t take your eye your eye off the ball when it comes to protecting your personal and corporate data. A report from a consulting firm, Positive Technologies, painted a dark, dark picture, saying the second quarter of 2018 showed a 47 percent increase over 2017. You need
  • 13 Nov, 2018
  • Norman Rosenthal
  • 0 Comments
  • credential compromise, data security, DDoS, hacking, Malware, online safety, risk management, security, social engineering, web attacks,
Read more
09Oct2018

Updating Your Cloud Strategy

We hear all about the cloud without end. For large corporations and individuals, using the cloud is a nearly flawless solution for storing and accessing apps and data from anywhere. But for small businesses, exclusive reliance on the cloud may not be the best solution. Here are some decision-making factors. First, for all their differences
  • 9 Oct, 2018
  • Norman Rosenthal
  • 0 Comments
  • cloud computing, IaaS, performance, risk management, SaaS, security, small business, upgrade,
Read more
09Oct2018

Hello, New Security Technology

Passwords are on the verge of becoming extinct, and for many people, the passing of passwords will be like getting rid of a migraine. With the latest Windows 10 major update from Microsoft, your computers and devices may now say “hello” to you to access Microsoft accounts, and additional security measures may now work together
  • 9 Oct, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybersecurity, risk management, security, Windows 10,
Read more
11Sep2018

Password Agony; No Ecstasy

Passwords are a total pain. Upper- and lower-case letters, numbers and special characters in one password are likely unbreakable over the course of a lifetime. But just to be safe, you’re required to change them periodically – without repeating one you’ve previously used for a website. And if you go to extremes, well, it is
  • 11 Sep, 2018
  • Norman Rosenthal
  • 0 Comments
  • cybercrime, cybersecurity, data security, online safety, privacy, risk management, security, spoofing, strong passwords,
Read more
Older Posts >>