April 29, 2019

Here is a sample of a ransom email I received, like ones that have been reported to be by others. This one has been called the Cisco Router Sextortion Scam.  This one seems to have better grammar then past ones.  The details don’t make any sense. The only thing in the...

April 8, 2019

ACH Scam

Vendor ACH request fraud is on the rise.  The scam works this way, cybercriminals stalk their prey (research or intelligence gathering) looking for a new contract award for a vendor or find an existing vendor typically for a local government.  Information lik...

April 2, 2019

Question from a friend. 

“I have a computer with a 10-year-old processor running Windows 7. I need better performance from my computer. What should I do?”

Computers are not single task machines and pinning down the best system for the desired performance has several fact...

Please reload

Featured Posts

Does Security Awareness Work?

July 18, 2018

1/10
Please reload

Archive
Please reload

Follow Me
  • Facebook Basic Square
  • LinkedIn Social Icon
  • Twitter Basic Square
  • YouTube Social  Icon
  • SlideShare

© 2018 by Donald E. Hester. Proudly created with Wix.com     |    Sponsored by

  • Facebook Social Icon
  • LinkedIn Social Icon
  • Twitter Social Icon
  • YouTube Social  Icon
  • SlideShare