One of my clients recently mentioned to me that they are preparing for an annual inspection required by the regulations that govern their industry. One of the issues that they are dealing with is an expanded scope of due diligence with regard to their vendors; they are now being required to formally vet any vendors…
Continue Reading »
One of the questions I hear most often from my residential clients as they drop off an ailing PC is, “will I lose all of my pictures?” In many cases, I am able to save most, if not all, of the data on their hard drives (pictures, emails, addresses, browser bookmarks, etc.) My commercial clients…
Continue Reading »
In Beware of Social Engineers, I wrote that I’ve recently had several clients that have contracted nasty malware that masquerades as security software and claims that the victim’s PC is infected. It then offers to clean up the infections – if you pay for the software. Of course, by that time the damage is done,…
Continue Reading »
This is a technology-focused blog, so I’m not talking about those folks trying to affect our general society using political means. I’m talking about the ones who practice social engineering for the purpose of gaining some control over or unwarranted compensation from your use of your computer. In this context, Social Engineering has traditionally meant…
Continue Reading »