...

Politics, Impeachment Are Heating Up

The looming impeachment process slowly swallowed up everything else. Formally, that occurred with the delivery, on Thursday, of the two articles of impeachment against President Trump.

Tech Tip: Bookmark the Websites You Frequently Visit

Here’s a sneaky trick used by many hackers. They purchase and set up a fraudulent website that is a close misspelling of a legitimate one.

Tech Tip: Never Use Personal Devices to Connect to Company Data

Since most malware is designed to operate in total stealth mode, undetected, you won’t know that some hacker is watching you log in to your company’s file server or key cloud application.

Tech Tip: How to Spot a Phishing Email

Often these emails look 100-percent legitimate. They show up in the form of a PDF, a UPS or FedEx tracking number, a bank letter, a Facebook alert, a bank notification, etc.

Tech Tip: How to Foil Ransomware

After your files are compromised, the hackers behind the attack pop up a demand screen asking for payment within a set time frame in order to get the key to decrypt your files.

Impeachment Coverage: A Screen Split Like the Nation

At the very time when Democrats and Republicans were loudly debating and preparing to vote on two articles of impeachment, Trump was speaking at a rally in the electorally critical state of Michigan.

Tech Tip: If This Type of Alert Pops Up, Don’t Click!

A pop-up notification that your PC is infected with a virus and you must “click here” to run a scan or install antivirus software is a common scareware tactic.

IG Testifies About FBI Probe of Trump Campaign (photos)

While concluding that the probe was not motivated by political bias, Michael Horowitz’s report also listed 17 errors in how the FBI sought to carry out surveillance of former campaign advisor Carter Page.

Tech Tip: Use Strong Passwords!

Hacking software can guess a five-character password in under three hours. If you only use lowercase letters, it’s 11.9 seconds.

Tech Tip: Working From Home? Don’t! Until You Read This …

Unless your personal device is covered under a network security plan, you could accidentally introduce a virus to the company’s network.