XFER Blog

XFER has been serving the Livonia area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is Your Healthcare Organization HIPAA Compliant?

b2ap3_thumbnail_hipaa_is_protecting_you_400.jpgTechnology plays a crucial role in the healthcare industry, and thanks to the Health Information Technology for Economic and Clinical Health Act (HITECH), healthcare providers and insurance companies in the United States have to abide by a specific set of regulations when it comes to handling patient data.

0 Comments
Continue reading

Two-Factor Authentication: What Does the Future Hold?

b2ap3_thumbnail_two_factor_authentication_400.jpgPasswords are slowly becoming obsolete in the face of more powerful security solutions. This is especially true considering how a hacker can input millions of characters every second in an attempt to break into your account and unleash who knows what into your business’s network. While using a password is still a good idea, professionals are working tirelessly to bring the new face of two-factor authentication to light.

0 Comments
Continue reading

Hackers Lay Claim to 4½ Million Medical Records

b2ap3_thumbnail_stethescope_keyboard_400.jpgIf 2014 hasn't been a legendary year for data breaches yet, it certainly is now. Community Health Systems, a hospital network for over 206 facilities across the United States, has been the target of a data breach resulting in 4.5 million records being compromised by Chinese hackers, including Social Security numbers, birthdays, names, addresses, and telephone numbers.

0 Comments
Continue reading

Hairballs and WiFi Data are What the Cat Dragged In

b2ap3_thumbnail_warkitteh_on_the_loose_400.jpgFor Washington D.C. residents, there's a dubious threat looming in their backyards putting their personal data at risk. It's Coco, a Siamese cat wearing a high-tech collar designed for hacking WiFi networks. Have you taken the proper security measures to protect your sensitive information from feline foes like Coco?

0 Comments
Continue reading

When it Rains, it Pours – Keep Your Cloud-Based Data Safe

b2ap3_thumbnail_keep_cloud_data_safe_400.jpgDo you see those black clouds culminating on the horizon? They represent the possibility that hackers will gain access to your cloud storage. Though it is protected a number of ways, it will not stop an experienced hacker. To them, your defenses are as transparent as those thin, wispy, cirrus clouds that are so welcome on a boiling hot summer day.

0 Comments
Continue reading

How an Intimate Selfie That’s Deleted Can Be Recovered and Used for Blackmail

b2ap3_thumbnail_smartphone_security_400.jpgWhen it comes time to upgrade, many smartphone users will sell off their old device in hopes of making extra cash. However, if the phone's memory is improperly wiped, an experienced hacker can use advanced tools to recover sensitive data off the used phone. Let's talk about how this happens and what can possibly be recovered by a hacker.

0 Comments
Continue reading

Apple’s iOS May Contain Backdoors to Leak Sensitive Information

b2ap3_thumbnail_ios_vulnerability_is_curious_400.jpgApple's iOS operating system might be well known for its impressive security features, but that doesn't mean that it's invulnerable to all threats. In fact, backdoors may have been located in the operating system, which allow Apple and law enforcement agencies like the NSA to access the devices.

0 Comments
Continue reading

Escape the Phisherman’s Hook – 4 Tips to Get You off the Line

b2ap3_thumbnail_phishing_scams_400.jpgThe Internet is a vast ocean filled with all sorts of different creatures. Many are harmless, like the bottlenose dolphin, but once in a while you will encounter an aggressive shark. But no matter how powerful or intelligent these creatures are, they still wind up flopping around on the deck of some fisherman's boat. Why? Because fishermen know what they're looking for and how to capture it. The same can be said about Internet phishers.

0 Comments
Continue reading

The Virtual Hand that Terrorizes the Cradle

b2ap3_thumbnail_internet_connected_security_400.jpgIn today's connected home, Internet security needs to extend beyond the PC. Any device that's connected to the Internet needs to be password protected, secured with a firewall, and utilize available security apps. These precautions should be taken even with seemingly harmless devices like baby monitors. A family from Ohio recently learned this lesson the hard way.

0 Comments
Continue reading

Internet Security: This Is Why We Can’t Have Nice Things!

b2ap3_thumbnail_security_from_hackers_400.jpgWhen you were a kid, did you ever ask your parents for a cool new toy only to have your request denied because you were in the habit of breaking everything? Your parents would point out your destructive habit and tell you, "This is why we can't have nice things." As an adult, the coolest toy is the Internet and hackers want to break it.

0 Comments
Continue reading

Alert: Heartbleed Bug Threatens Popular Websites!

b2ap3_thumbnail_bleeing_heart_one_400.jpgOn April 7th, a new bug on the Internet was discovered that's putting millions of users' personal data at risk. Given the name "Heartbleed bug," it's capable of allowing infiltrators to collect information while you are securely browsing a SSL/TLS website. Since SSL/TLS is so widely used, it's very probably that your personal data is at risk.

0 Comments
Continue reading

How the Personal Information of 200 Million Users Wound Up on an Illegal ID Theft Service

b2ap3_thumbnail_secure_the_information_you_can_400.jpgYou're likely familiar with the various ways that hackers can steal your identity, but you may not be familiar with how hackers anonymously buy and sell people's personal information to interested parties. This is done through online ID theft services and a December hearing before the U.S. Senate highlights how one service was selling personal records on more than 200 million Americans!

0 Comments
Continue reading

What do Hackers Want with Your Email?

b2ap3_thumbnail_hackers_are_after_you_400.jpgThe value of your email account cannot be understated. You may think less of your email inbox because there are so many other ways to digitally communicate, but to a hacker, your email is a goldmine of valuable information. You may use your email less than ever before, but that doesn't mean you can neglect email security.

0 Comments
Continue reading

2 Million Passwords Stolen! Have You been Hacked?

b2ap3_thumbnail_pword400.jpgOn December 3, 2013, security company Trustwave discovered over two million stolen user passwords for popular online services like Facebook, LinkedIn, Google, Twitter, Yahoo, and 93,000 other websites. There's a high probability that you use one of the services affected by the hack. Is your personal information compromised?

1 Comment
Continue reading

Protect Your Business with Intelligent Surveillance Cameras

b2ap3_thumbnail_cam400.jpgThe world you do business in is a pretty dangerous and messed up place, and things always seem to be getting worse. Thankfully, security technology is improving, which helps offset the risks of living in a perilous world. You can take advantage of these security improvements by installing intelligent surveillance cameras for your business.

0 Comments
Continue reading

How to Protect Your Cloud Hosted Data from Security Breaches

b2ap3_thumbnail_secure400.jpgRecently, Adobe sent out e-mails and letters to users notifying everyone of a security breach. "The attackers may have obtained access to your Adobe ID and encrypted password." The obvious question here is, "How do I protect myself and my business from such attacks?" The unfortunate answer is you can't, but you can marginalize the impact by taking some common sense measures.

1 Comment
Continue reading

Trojan:Win32/Crilock.A Nasty Ransomware You Need to Guard Against

b2ap3_thumbnail_virus1-400.jpgOn September 10th, 2013, a new ransomware known as Trojan:Win32/Crilock.A began attacking computers all over the Internet, locking users out of their PCs and putting sensitive information at risk. If your computer gets it, then you're in for a world of hurt. Here are the details on what this virus does and what you can do to prevent it.

0 Comments
Continue reading

It’s Time to Reevaluate How You Share Photos

b2ap3_thumbnail_selfie400.jpgIf you use a smartphone to take personal pictures and post them to the Internet, then you may unknowingly be posting more about yourself than you want to, like where and when the picture was taken. This information in the hands of the wrong person can lead to dangerous consequences, like theft of your property, your identity, or even kidnapping.

0 Comments
Continue reading

Don’t Forfeit Your Command-and-Control Center To a Zombie Army

b2ap3_thumbnail_zomb400.jpgWith an increase in Distributed Denial of Service (DDOS) attacks and packet flooding volume, its evident that hackers are using compromised web servers for their malicious activities. By infecting servers, these dastardly infiltrators create a Zombie command-and-control center to direct their malicious activities from.

0 Comments
Continue reading

Russia Protects Communications by Using Typewriters

b2ap3_thumbnail_typewriter400.jpgIf you have been following international news headlines with stories like WikiLeaks spreading confidential documents, and recent revelations about a US surveillance scandal, it kind of feels like we are in the middle of Spy vs. Spy. As nations look for stronger security solutions to protect themselves, Russia is looking to older technology to keep their communications safe.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

2011
January
February
March
April
May
June
July
October
December
2010
January
February
March
April
May
June
July
August
September
October
December

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *