502-241-2600      shopping cart    Get SUPPORT

MCM Kramer Technology Solutions Blog

Kramer Consulting has been serving the Crestwood area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Facebook's Largest Breach of Accounts

Numbers look to be around 50 Million users affected by the latest Facebook breach. Facebook has been losing credibility left and right making this hack and even harder blow. You can read about how the attack happened, the after-effect investigation and what's next from USA Today's news read

Continue reading

Internet of Things and it's first Cybersecurity law

It's happening, the internet of things has a cybersecurity law beginning in California. The security law will require a setting of password that comes from the start or prompts users to create one. You can read more in depth in this article from The Verge. 

Continue reading

How do Google employees resist phishing hacks?

At KCI it is our pursuit to help our client build security awareness in every staff member. Phishing attacks target all users, therefore, all teams should have security awareness training and constant education on tactics of hackers.

Google is a very high target and yet constantly stays hack-proof. How? Actual legit 'security keys' are part of their success along with many other security measures. You can read more of their success story here.

How does your security plan for your business stack up? Contact us today if we can help you take your team to a deeper level of understanding their role in securing your company. 

Continue reading

How to: Reduce your digital Security Risks

You may feel safe and not-as-appealing to hackers if you have a small business, however, research over time and data from this Tech Republic article show that 50% of hacks are targeting small business owners.

Read over some of the reasons why and preventative measures you can take here

Continue reading

Lesson Learned: Even the Military needs to Keep Secure Networks

Mashable shared this article recapping a hacker who was selling military drone documents for $200. Sounds a little too cheap right?

After some further digging there was a bug revealed back in 2016 with Netgear security routers and a fix was available. Take this as a lesson learned and ensure your networks are not only kept secure but heed warnings when offered as well. 

You can read more about the hack and drone documents in this article by clicking here

Continue reading

How-To: Lock down Your Privacy in Fitness Apps

There are lots of positive reasons to use some of the latest fitness apps, however, there are also several reasons to check your privacy settings within these apps. Lifehacker provided some great basic tips to consider:

  • Don’t use your real name (and beware logging in through Facebook, which knows your real name). Consider using a profile pic that doesn’t show your face.
  • Don’t track runs that start from your house.
  • Keep your runs private by default.
  • Hide the time of your runs, if possible, so a stalker doesn’t know when to stop by your favorite park. (Keep in mind that there’s a timestamp whenever you share a post to social media, too.)

You can read more in this helpful article and consider taking a glance at the privacy settings on any fitness apps you might be using. 

Continue reading

Can our Phones Spy on Us?

It's a time in tech history when more are considering their privacy settings, their data being shared and questioning what technology can truly do.

This article shares some findings on capabilities of phones and the option to spy on the user. You can learn more here. 

Continue reading

How-To: Keep your Smart Home Secure

Smart homes can enhance your life so long as you ensure they are highly secured. Read this article from Big Think to make sure you don't find yourself in a nightmare scenario. 

Continue reading

My Data Request: check out what Info You are putting out there

With privacy policies and security updates happening all over, consumers are becoming more aware to what data or info is being collected from them. Are you curious what companies actually know and track about you? 

My Data Request is a site allowing you to just that. You can see over 100 different companies and what data they have collected about you. Checking the site out doesn't mean that the companies will stop collecting data, but at least you will be more in the know of what info you are sharing and with whom. You can learn more by clicking here. 

Continue reading

iOS 12 to share your Exact Location with 911 responders

Sometimes you may chose to share your location with others, but when in emergency you want those details to be as precise as possible. Apple is working on improving the shared location features to be compatible with the 911 capabilities that are mostly aligned to work with landlines. You can check out details here from CNN's article. 

Continue reading

Microsoft's Underwater Data Center

Project Natick is the name of Microsoft's latest data center that has been dropped to the bottom of the ocean. Kinda odd, right?

In many ways it makes sense that underwater data centers exist since 50 percent of the world's population lives near the coast and the water helps to regulate the tempature. You can learn more in this Gizmodo article. 

Continue reading

How-to: Join the 5 percent in control of their data

Protecting  your data is an important conversation going on right now. You are likely to be finding tons of emails updating you on various company's privacy policies. How many people actually spend time reading that stuff? Tech giants like Facebook and Amazon believe only about 5 percent actually update or respond to privacy update emails. 

The attached article does a great job of explaining simple steps you can take to protect your data and what privacy settings you should update. Geoffrey A. Fowler says, "On the internet, the devil's in the defaults." 

Take control of your data and don't fall into the 95 percent crowd not taking time to make small changes. You can read more tips and all the details of leaving default settings far behind you in this Washington Post article. 

Continue reading

Be Aware of Mail Fishing

Hackers are now using sticky traps to quite literally "mail fish." You can read a case example of a check mailed to pay a bill that was caught and became a victim fraud story in this CNBC article.

Take precaution by learning more and practicing safe mail steps.  

Continue reading

Real-time cell phone locations leaked

Location Smart is meant to be a device to enable users to track their own phones following an authorization process. Unfortunately the demo had a bug that allowed easy hacking to track the cell phones of almost any U.S. user in real-time. You can learn about what happened from this Ars Technica article. 

Continue reading

No longer signing for Credit Card purchases

Was there any security in that credit card purchase signed receipt? Apparently not.

Visa, Mastercard, Discover and AmEx have all announced that as of April 2018 you no longer have to sign for credit card purchases. Chip cards are meant to improve the security of credit purchases making signatures obsolete.

Having trouble wrapping your mind around this? Check out more in this article from The Motley Fool. 

Continue reading

Does Apple care more about your privacy?

apple

Image: VisualHunt 

Many customers are starting to reach out and learn just how much their tech partners know about them. Lifehacker provided a great article about how to contact Apple to see what data is tracked for you. If you are curious about the how-to simply click on the attached article and learn more. 

Continue reading

Drop WhatsApp for your Privacy's Sake

Facebook and WhatsApp are all over the news lately and for good reason. This article shares why you should drop WhatsApp for your own personal privacy. Read more by clicking this Lifehacker link. 

Continue reading

Are you among the unlucky 87 Million of Facebook? What to do...

As the truth of Facebook's activity continues to surface users are being notified if they are among the 87 million affected. What do you do then? 

You can follow some advice in this HuffPost article found by clicking here. 

Continue reading

Why did it take Facebook 3 years to notify?

Facebook is now implementing some big platform changes as they notify users of the privacy scandal. The problems were first uncovered in 2015, so what took so long? 

You can read more about the scandal and the new implementation in this VERGE article. 

Continue reading

Why Facebook Messenger is the Worst Choice

There are lots of reasons to stop using Facebook Messenger, from scanning messages, to read receipts and many more invasive measures. Check out this article for some of the Messenger activity and why you should stop using it. 

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite