
In 2017, hundreds of thousands of computers in 150 countries in a matter of hours were infected with a virus, locking the computers and demanding a …
Quick Steps for Lawyers to Improve Cybersecurity and Protect Client Data
In 2017, hundreds of thousands of computers in 150 countries in a matter of hours were infected with a virus, locking the computers and demanding a …
Quick Steps for Lawyers to Improve Cybersecurity and Protect Client Data
Apple’s latest update fixes security vulnerabilities in Safari and elsewhere, giving users enhanced protection from spyware and malicious WiFi networks.
For a complete list of all iOS 15 security features, watch the video or read this article available on Forbes.
From NW Sidebar:
In 2020, there was a 435 percent increase in ransomware as compared to 2019. How can you avoid a cyber security breach? Follow these six steps:
Read the full post here.
FBI Tech Tuesday posts are an easy way to stay informed about cyber security issues. View, search, or subscribe to articles here.
COVID, wildfires, court operations, and closures dominated headlines and our lives. So did the tech world, the hard work of staying productive, and not letting the stress of it all get to us.
Hopefully you found some useful posts in 2020. If you’ve been battling procrastination, there is help. If you need to jump start your marketing, I did a four part series in July. If collecting fees has been … challenging … I have a few suggestions. Here’s a recap of substantive topics covered in the past twelve months. And here’s to 2021!
All Rights Reserved 2020 Beverly Michaelis
While traveling is not as prevalent as it was before COVID-19, we remain mobile. That means you can still run out of juice while away from the office.
Did you know that using a charging port, borrowing a cable, or relying on someone else’s external battery can put your smartphone, tablet, or laptop at risk?
The problem is malware, in which hackers take advantage of USB connections to hide and deliver secret data payloads that a user might think was only transferring electrical power. This is called “juice jacking.” Its visual counterpart, known as “video jacking,” occurs when a hacker records and mirrors the screen of a device that was plugged in for a charge.
The FBI recommends:
Do | Don’t |
Use AC power outlets to charge devices | Use USB charging stations in public places |
Buy only from trusted suppliers | Avoid cheap deals and free giveaways |
Bring your own car charger | Don’t borrow car chargers |
Bring your own USB cables | Don’t use someone else’s |
Bring your own AC or battery backup | No borrowing! |
There’s another good reason to buy genuine electronic accessories from the manufacturer. They prolong the life of your device by charging it properly and completely.
As an example, the charging cables for your iPhone and iPad are not identical. The same is true of Samsung devices. I’m not saying that switching out proprietary chargers among your devices won’t work. I am saying that doing so is not optimal. And that’s within the same device manufacturer ….
Before we had to worry about juice jacking, I fell down the path of cheapie chargers. I learned quickly that I was wasting my money. If you don’t believe me, just Google “why cheap charging accessories don’t work,” to see pages of posts and warnings.
Better safe than sorry.
All Rights Reserved 2020 Beverly Michaelis