• October 1, 2022

    Security Questions Your Organization Should Be Asking Itself

    We’re increasingly hearing from organizations that need to establish that they have sufficient security policies in place, either to meet the requirements of a larger client or to qualify for cyber insurance that insures against breaches and similar losses. Details vary, and we’re happy to work with you on the specifics, but here are some of the kinds of questions you may be asked. Of course, i... Read more
  • August 9, 2022

    What Should I Do If I Get an “AirTag Found Moving With You” Message?

    First, don’t panic. Most likely, you’re borrowing something with an Apple AirTag location tracker attached to it, or someone left something with an attached AirTag in your car. Second, tap the alert to open the Find My app, which displays a map showing where the AirTag has been with you, which might shed some light on wh... Read more
  • August 2, 2022

    How to Restore Missing SMS Two-Factor Authentication Codes

    Many websites, from Adobe to Zendesk, let you receive two-factor authentication codes via SMS text messages. That’s good—any form of two-factor authentication is better than none—but you’re often effectively locked out of your accounts if those text messages don’t arrive. A simple fix is to call your cellular carrier and ask to have any blocks removed from your account. Automated scam and fraud... Read more
  • May 3, 2022

    Block Malicious and Adult Web Sites with DNS Filtering

    One of the best ways to keep malware from infecting your computers is to avoid visiting websites designed to do just that. No one intentionally visits loadmetogetinfected.com, but malware authors employ all sorts of tricks to lure unsuspecting users into viewing malicious sites. Various tools can help, but the easiest free technique is called DNS filtering. DNS, which is short for Dom... Read more
  • April 19, 2022

    Export Passwords from Safari to Ease the Move to a Password Manager

    Although Apple has improved the built-in password management features in macOS and iOS (you can now add notes to password entries!), third-party password managers like 1Password and LastPass are still more capable. For those still getting started using a pas... Read more
  • April 12, 2022

    Use Face ID While Wearing a Mask in iOS 15.4

    Shortly after the start of the COVID-19 pandemic, Apple made it so your Apple Watch could unlock your Face ID-enabled iPhone when you were wearing a mask. Starting in iOS 15.4, the company has taken the next step and enabled Face ID on the iPhone 12 and later to work even when you’re wearing a mask. If you did... Read more
  • April 5, 2022

    Increase Business Cybersecurity Awareness in Light of Russian Invasion of Ukraine

    For several decades, Russia has targeted a wide variety of cyberattacks at countries with which it has had disputes. That includes the United States and other Western nations, which have recently levied unprecedented sanctions against Russia after it invaded Ukraine. Read more
  • January 13, 2022

    Plan for the Future by Establishing a Legacy Contact

    Have you heard the expression “hit by a bus”? It’s a somewhat macabre attempt to inject a little levity into planning for the unthinkable event of dying without warning. No one expects to be hit by a bus, but people do die unexpectedly in all sorts of ways. That’s terrible, of course, but it’s also incredibly hard on that person’s family, who suddenly must deal with an overwhelming number of de... Read more
  • January 4, 2022

    How to Stop Forgetting Your Apple Gear with “Notify When Left Behind”

    Apple’s Find My technology is a lifesaver when it works, enabling you to locate and potentially retrieve lost or stolen devices. It’s not perfect, even with the addition of the Find My Network, which drafts other nearby Apple devices to relay the location of a lost device, but it’s a heck of a lot better than nothing. Part of the problem is that you have to notice that a device is missing befor... Read more
  • November 23, 2021

    Avoid Unusual Top-Level Domains in Custom Domain Names

    Remember the heady dotcom days, when businesses were desperate to get a short, memorable, easily typed .com domain? It quickly became difficult to get what you wanted—so much so that deep-pocketed companies paid exorbitant sums for just the right domain. Before we go an... Read more