Home|Michael Cohen

About Michael Cohen

This author has not yet filled in any details.
So far Michael Cohen has created 487 blog entries.

Hackers’ Newest Trick Hides Ransomware While It Encrypts Victims’ Files

A ransomware variant known as Snatch is now more dangerous than ever. Learn about the newest trick that cybercriminals are using to make this ransomware harder to detect while it is encrypting files. Cybercriminals have been using a ransomware variant known as Snatch to encrypt files on Windows computers since 2018. Recently, researchers at SophosLabs discovered that

2020-01-29T19:06:29+00:00January 29th, 2020|Thought Leadership|

4 Information Technology Trends to Track in 2020

It is important for companies to keep track of IT developments that can affect their businesses. Here are four trends to watch in 2020. The IT world changes often. While it would be impossible to keep abreast of every change that occurs, knowing about and keeping track of important IT developments is important. This information

2020-01-29T18:50:45+00:00January 29th, 2020|Thought Leadership|

CCPA is Now in Effect. Are you Compliant?

On January 1st, 2020 the California Consumer Privacy Act (CCPA) went effect for new consumer privacy rights. This empowers consumers with more power against larger businesses selling their data. Is your company affected by this new law, and if so, are you compliant? This new law is designed to protect and educate California consumers in

2020-01-29T18:47:46+00:00January 29th, 2020|Thought Leadership|

Here’s What You Can Do If You Aren’t Ready to Say Goodbye to Windows 7

Windows 7 reached the end of its life cycle on January 14, 2020. Here are your options if you want to keep using it. The sun is setting on Windows 7. If you are still using this old but reliable workhorse in your business, it might be time to say goodbye and let it ride

2020-01-29T14:09:36+00:00January 29th, 2020|Thought Leadership|

Keep Tabs on Which Version of Windows 10 Your Business’s Computers Are Running

Windows 10 follows a different lifecycle than its predecessors. Learn about this lifecycle and how to check a computer to see if it is running an unsupported version of Windows 10. With all the attention that Windows 7’s demise is getting, another deadline has passed with much less fanfare. On November 12, 2019, Windows 10

2020-01-06T11:48:15+00:00January 6th, 2020|Thought Leadership|

6 Things to Consider When Choosing an Anti-Spyware App

Cybercriminals use spyware to record keystrokes, copy files, read emails and much more. One of the best ways to keep spyware off your devices is to use an anti-spyware program. Here are six things to consider when selecting one. Spyware is a type of malware that can send chills up the spine of even the

2020-01-06T11:41:07+00:00January 6th, 2020|Thought Leadership|

How to Use Your Laptop’s Bluetooth Connection Securely

Using Bluetooth to connect devices to your laptop is convenient but also risky. Discover what those risks are and how to minimize them. Many laptops come with Bluetooth connectivity. Thanks to this wireless technology, you can easily connect a keyboard, mouse, headset, or other peripheral to your laptop. You can even use it to send

2020-01-06T11:37:54+00:00January 6th, 2020|Thought Leadership|

Company Was Hacked More Than 20 Times Over Nearly 2 Years

For nearly two years, a business was unaware that a cybercriminal was repeatedly hacking its IT systems, which lead to the cybercriminal stealing the personal data of 1 million people — and an FTC investigation. Here is what the FTC found and the lessons that you can learn from this case. For nearly two years,

2020-01-06T11:01:42+00:00January 6th, 2020|Thought Leadership|

Flaws in Qualcomm Chipsets Are Leaving Android Devices Vulnerable

The Qualcomm chipsets in many Android smartphones have vulnerabilities that could let cybercriminals gain access to passwords and other highly sensitive data stored in the devices. Here is what you need to know about these flaws. Cybercriminals access the area where passwords, fingerprint scans, payment card numbers, and other highly sensitive data are stored. Check

2020-01-06T10:56:39+00:00January 6th, 2020|Thought Leadership|
Go to Top