Catch IT

Catch-IT: Using Internet Explorer? Time to Move On…

Released back in 1995, Internet Explorer (IE) was once the browser standard.  Installed by default on every Windows computer, IE held about 95% of the market share in the early 2000s.  Today, Microsoft is urging users to stop using Internet Explorer as they are no longer supporting new development [...]

Dark Web Monitoring – Is It Worth It?

The name alone sounds pretty impressive.  A recent service offered by security companies to scan the dark web for your personal information. Since the dark web is a place where lots of cybercriminals conduct business, it makes sense to monitor this, right? First, what is the dark web? Most of [...]

By |2020-12-28T12:13:02-05:00March 25th, 2019|Categories: Advisory, News|Tags: |

Catch-IT: Largest Collection of Breached Data Found – 3 Billion Accounts Compromised

Time to change those passwords again!  Two massive breaches occurred within the last month, totaling approximately 3 billion compromised usernames and passwords. On January 17, the details of the world’s largest online dump of personal data, Collection #1 was published.  This breach contained usernames and passwords relating to 772,904,991 [...]

By |2020-12-28T12:05:30-05:00February 13th, 2019|Categories: Advisory, Catch IT, CyberSecurity|

Catch-IT: Microsoft Releases Emergency Patch for Internet Explorer

Microsoft is urging users of the Internet Explorer to update their browser after finding a major flaw. The browser's memory corruption vulnerability lets attackers remotely execute code as if they were the computer's user, essentially giving them control of the computer, Microsoft wrote in a Wednesday security notice. An [...]

By |2020-12-28T11:31:13-05:00December 21st, 2018|Categories: Advisory, Catch IT, CyberSecurity|

The Passphrase – An Upgrade to your Current Password

It's time to upgrade your password.  Consider the following password Do's and Don'ts and the challenges they present. Let's start with the Don'ts: Password Don’ts Use your login name (ssmith) Use a sequence or repeated characters (“123456” or “abc123”) Reuse for different accounts Share. A secret is no longer [...]

By |2020-12-28T11:06:39-05:00November 20th, 2018|Categories: Advisory, CyberSecurity|

Increase in trade tariffs on Chinese imports – how will this affect tech prices?

By early December, the U.S. is preparing to announce an increase on proposed tariffs for all remaining Chinese imports if talks between presidents Donald Trump and Xi Jinping fail to ease the trade war, according to a Bloomberg report. If Trump fails to reach an agreement with Xi, not only would there be new rounds [...]

By |2019-01-03T16:48:46-05:00November 6th, 2018|Categories: Advisory|Tags: |

Embarrassment and Breached Passwords – the Latest Hacker Combination

A new scam has surfaced that uses a combination of breached passwords and adult content to scare people into paying bitcoin. This latest extortion campaign sends emails to compromised recipients, demanding payment or supposed video of them using an adult site would be released. What Can You Do? Since the message [...]

By |2018-09-10T14:56:17-05:00September 10th, 2018|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |

Dell to Halt Windows Downgrade, Effective October

Dell recently announced they will stop selling PCs with the option to downgrade to Windows 7 OS, effective October 1. The last day existing Dell users have to downgrade their current PC to Windows 7 is October 31. What You Need to Know As of October 1, 2018, you will [...]

By |2018-08-20T14:44:21-05:00August 20th, 2018|Categories: Advisory, Catch IT|

Breach Response Checklist for Businesses

These days data breaches have become almost commonplace.  It's no longer "if you get breached" but rather "when you get breached".  While prevention is still key, it is important to implement procedures to quickly detect breaches and contain the damage once confirmed.   Likened to fire preparedness in an office building, [...]

By |2019-01-03T16:49:45-05:00July 9th, 2018|Categories: Advisory, CyberSecurity|Tags: , |
Go to Top