We’re increasingly hearing from organizations that need to establish that they have sufficient security policies in place, either to meet the requirements of a larger client or to qualify for cyber insurance that insures against breaches and similar losses. Details vary, and we’re happy to work with you on the specifics, but here are some of the kinds of questions you may be asked. Of course, i... Read more
First, don’t panic. Most likely, you’re borrowing something with an Apple AirTag location tracker attached to it, or someone left something with an attached AirTag in your car. Second, tap the alert to open the Find My app, which displays a map showing where the AirTag has been with you, which might shed some light on wh... Read more
Many websites, from Adobe to Zendesk, let you receive two-factor authentication codes via SMS text messages. That’s good—any form of two-factor authentication is better than none—but you’re often effectively locked out of your accounts if those text messages don’t arrive. A simple fix is to call your cellular carrier and ask to have any blocks removed from your account. Automated scam and fraud... Read more
One of the best ways to keep malware from infecting your computers is to avoid visiting websites designed to do just that. No one intentionally visits loadmetogetinfected.com, but malware authors employ all sorts of tricks to lure unsuspecting users into viewing malicious sites. Various tools can help, but the easiest free technique is called DNS filtering.
DNS, which is short for Dom... Read more
Although Apple has improved the built-in password management features in macOS and iOS (you can now add notes to password entries!), third-party password managers like 1Password and LastPass are still more capable. For those still getting started using a pas... Read more
Shortly after the start of the COVID-19 pandemic, Apple made it so your Apple Watch could unlock your Face ID-enabled iPhone when you were wearing a mask. Starting in iOS 15.4, the company has taken the next step and enabled Face ID on the iPhone 12 and later to work even when you’re wearing a mask. If you did... Read more
For several decades, Russia has targeted a wide variety of cyberattacks at countries with which it has had disputes. That includes the United States and other Western nations, which have recently levied unprecedented sanctions against Russia after it invaded Ukraine. Read more
Have you heard the expression “hit by a bus”? It’s a somewhat macabre attempt to inject a little levity into planning for the unthinkable event of dying without warning. No one expects to be hit by a bus, but people do die unexpectedly in all sorts of ways. That’s terrible, of course, but it’s also incredibly hard on that person’s family, who suddenly must deal with an overwhelming number of de... Read more
Apple’s Find My technology is a lifesaver when it works, enabling you to locate and potentially retrieve lost or stolen devices. It’s not perfect, even with the addition of the Find My Network, which drafts other nearby Apple devices to relay the location of a lost device, but it’s a heck of a lot better than nothing. Part of the problem is that you have to notice that a device is missing befor... Read more
Remember the heady dotcom days, when businesses were desperate to get a short, memorable, easily typed .com domain? It quickly became difficult to get what you wanted—so much so that deep-pocketed companies paid exorbitant sums for just the right domain.
Before we go an... Read more