Home wireless security
My latest effort, up at 2Guys2Cities, simple steps to help keep your wireless internet connection from the casual nefarious user.
Follow these topics: Uncategorized
My latest effort, up at 2Guys2Cities, simple steps to help keep your wireless internet connection from the casual nefarious user.
Follow these topics: Uncategorized
This is the reality. Here’s the uncomfortable truth: As long as you permit your corporate apps and data to coexist on the same device as personal apps and data, you have an obligation to police both. It’s either that or insisting on strict partition separation, which is typically next to impossible to enforce or to…
“Training is a big part of protecting yourself from phishing attacks. There are a lot of ways to train employees, but giving them a phishing test is pretty standard. Can you recognize a phishing message? There are several free testing sites at OpenDNS or SonicWall.” Think you would always recognize a phishing attempt? Care to…
I wasn’t all that interested in Google’s new Desktop Search, but when even my wife’s grandmother starts asking about it, well what kind of a techie would I be if I couldn’t say whether it worked or not. So I installed it at work. It indexed my files in about 10 minutes, which is pretty…
Angela’s already at her folks for her brother’s wedding festivities. With all the out of office time I’ve got coming up for Gnomedex and vacation, I need to be at work tomorrow, so I’m not leaving until after work tomorrow. So I have the house all to myself, and I’m running amok! *L* No, really,…
Only 8% of Those Who Paid the Ransom Got ALL Their Data Back
Just When You Thought You Understood ESI
– linked documents instead of attachments are becoming the norm, should the legal industry ignore that and consider them attachments?
“Ultimately, a competent manager knows how to empathize. “
Data Retention Policies and Legal Hold Practices – Time to Revisit Because of Remote Work?
Security Vulnerabilities in Cellebrite
– the ethical arguments in this situation could go on for a long time.
“When AIs start hacking, everything will change. They won’t be constrained in the same ways, or have the same limits, as people. They’ll change hacking’s speed, scale, and scope, at rates and magnitudes we’re not ready for.”
Remote Workers Expect Pay to Reflect Their Locations
It’s a weird dynamic, certainly you don’t want to be valued less than coworkers, but living in a less expensive location is actually a competitive hiring advantage too.