Dark Web – Radio Interview

Audio and transcript of my radio interview on AM1100 about the dark web

Audio and transcript of my July 17th, 2017 radio interview about the dark web on the “Need to Know Morning Show” with Steve Hallstrom and Alex Taylor on  AM1100 The Flag, WZFG. You can read more about the Dark Web on my previous post here: What Is The Dark Web? – Weston Henry Transcript of my […]

What is the Dark Web?

The Dark Web is Real

What is the “Dark Web”? Think of an alternate universe that has the Internet but doesn’t have law and order. Where anyone can do anything they want on the Internet without worrying about getting caught. It’s like the evil twin of our current Internet. It actually works as a layer on top of the Internet […]

Fireball Malware Infects 250 Million Computers

Malware hiding a deeper threat

Over 250 million computers worldwide are estimated to be infected by a new malware called Fireball. Fireball takes over browsers and uses them to boost its advertisements. It does this by changing the browser’s default search engine to fake search engines that use Google or Yahoo in the background but include tracking techniques that allow […]

Backup Log

Simple tool to ensure your backups are working

I’ve created a backup log worksheet on the Small Business IT Plan website. This backup log gives you an easy way to keep track of the success or failure of your backups so that you can guarantee you know if your backups are working or not. If there are problems, using this backup log will help […]

Windows 10 S – What You Need to Know

Is Windows 10 S right for you at home, school, or business?

Windows 10S – What is it? Microsoft released a new version of Windows 10, called Windows 10 S, on May 2nd, 2017. Windows 10 S is a scaled-down version of Windows 10. If you’re familiar with Chromebooks, it’s easiest to think of Windows 10 S devices as similar to Chromebooks but using Windows 10 and […]

Data Loss Prevention Questionnaire

Ensure everyone is on the same page regarding your backup solution

I’ve uploaded a data loss prevention questionnaire on the Small Business IT Plan website. This questionnaire will enable you to identify the categories of data in your network, ensure you have a solid backup solution in place, and guarantee you meet your business’ requirements for backup and data recovery. You can get the questionnaire in […]

Cybersecurity: Battles Of Our Future (Futurist Series)

New forms of cyberattack will emerge in the near future

Looking back at the evolution of cyber attacks, it’s clear that the nature of cyber attacks are changing and getting more sophisticated. I am confident that cyber attacks will continue to increase, continue to grow more sophisticated, and continue to exploit new ways to profit from cyber crime. Here are my predictions for some of […]

The Future of Cyber Attacks

Phishing: What It Is And How Not To Get Caught

Easy steps to stay safe

What is phishing? Phishing is when someone tries to trick you into divulging sensitive information like passwords, bank accounts, etc. Phishing attacks are often conducted via email where the email is made to appear as though it’s coming from someone you trust. Examples of phishing One example of phishing would be if a scammer sends […]

Phishing: Don't get caught by surprise

What Is A Botnet?

And why you should care

Lately there has been a growing concern of botnets fueled by an increasing number of botnet-related articles in the news. The concern is valid as all signs point to botnets growing in number, size, and sophistication. The botnet threat isn’t likely to go away anytime soon and it’s probably going to get worse before it […]

Breach Announced By Yahoo, One Of The Largest Ever

1 Billion Records Stolen Back In 2013

Yahoo! recently disclosed that it discovered a data breach that occurred back in 2013. Yahoo! said the breach likely resulted in the theft of more than 1 billion data records. Yahoo! says those records contained names, email addresses, and passwords but not financial information. In September of 2016, Yahoo! disclosed that it had been breached by […]