Monday, October 7, 2013

Is your wifi secure?  Are you sure?  Are you guilty of one of these misguided mistakes: http://www.pcworld.com/article/2052158/5-wi-fi-security-myths-you-must-abandon-now.html#tk.fb_pc

If you need help securing your wireless network or want to have your security tested, contact Dynamic Network Support today (http://dynamicsupport.com)

Friday, October 4, 2013

Viruses are bad and every day reports indicate more and more people continue to be infected.  There are also many reports that the mobile device industry is now being targeted heavily.  Luckily, companies like Google are doing the research to accurately monitor and report threats.  Here is a great summary of one such Google Report from Quartz: http://qz.com/131436/contrary-to-what-youve-heard-android-is-almost-impenetrable-to-malware/

Do you think your device is infect?  Contact Dynamic Network Support today for a scan (http://dynamicsupport.com)

Tuesday, September 17, 2013

Webmasters and Google Analytics users, make sure you using a modern web browser (or at least upgrade to IE 9). Google is ending support in Analytics for IE8 soon. It will still register visits, but the actual navigation of Analytics will not be supported. More here: http://techcrunch.com/2013/09/16/google-analytics-to-end-support-for-ie8-by-years-end/

Need help upgrading your browser? Contact Dynamic Network Support today (http://dynamicsupport.com/)

Monday, September 9, 2013

Encryption is important to keep data and communication secure.  As those who want your data develop better techniques for getting it, others are working towards making it that much harder in order to keep you safe: http://www.engadget.com/2013/09/07/toshiba-quantum-access-networking

Worried about your data security?  Contact Dynamic Network Support today (http://dynamicsupport.com)

Friday, September 6, 2013

Iron Man (film series) lives and his name is Elon Musk. Elon Musk and company have created a real-life Iron Man style interface for design. Check it out here:http://www.engadget.com/2013/09/05/elon-musk-gesture-control-rocket-design-iron-man/

Monday, August 19, 2013

To finish up our 10 part series on computer security basics,Dynamic Network Support would like to urge everyone to take the lessons and information expressed here with them and we encourage you to audit your network security often, but remember Law 10:

Law #10: Technology is not a panacea

Technology can do some amazing things. Recent years have seen the development of ever-cheaper and more powerful hardware, software that harnesses that hardware to open new vistas for computer users, and services that change our expectations for both, as well as advancements in cryptography and other sciences. It's tempting to believe that technology can deliver a risk-free world if we just work hard enough. However, this is simply not realistic.

Perfect security requires a level of perfection that simply doesn't exist, and in fact isn't likely to ever exist. This is true for software as well as virtually all fields of human interest. Software development is an imperfect science, and all software has bugs. Some of them can be exploited to cause security breaches. That's just a fact of life. But even if software could be made perfect, it wouldn't solve the problem entirely. Most attacks involve, to one degree or another, some manipulation of human nature, a process usually referred to as social engineering. Raise the cost and difficulty of attacking security technology, and bad guys respond by shifting their focus away from the technology and toward the human being at the console. It's vital that you understand your role in maintaining solid security, or you could become the chink in your own systems' armor.

The solution is to recognize two essential points. First, security consists of both technology and policy—that is, it's the combination of the technology and how it's used that ultimately determines how secure your systems are. Second, security is a journey, not a destination—it isn't a problem that can be "solved" once and for all, but a constant series of moves and countermoves between the good guys and the bad guys. The key is to ensure that you have good security awareness and exercise sound judgment. There are resources available to help you do this. The Technet website, for instance, has hundreds of white papers, best practices guides, checklists and tools, and we're developing more all the time. Combine great technology with sound judgment, and you'll have more effective security.

If you need help with your network's security, please contact DNS today. (http://dynamicsupport.com/)

Source: http://technet.microsoft.com/en-us/library/hh278941.aspx
Law 9 in our 10 part computer security basics series is sad, but true. This rings even louder with all of the recent NSA Prism news. Here is law 9:

Law #9: Absolute anonymity isn't practically achievable, online or offline

All human interaction involves exchanging data of some kind. If someone weaves enough of that data together, they can identify you. Think about all the information that a person can glean in just a short conversation with you: In one glance, they can gauge your height, weight, and approximate age. Your accent will probably tell them what country you're from, and may even tell them what region of the country. If you talk about anything other than the weather, you'll probably tell them something about your family, your interests, where you live, and what you do for a living. It doesn't take long for someone to collect enough information to figure out who you are. If you use any payment system other than cash or any transportation other than your own two feet, you leave a trail of data breadcrumbs that can be used to reconstruct a personally identifiable “portrait” of you with remarkable accuracy. If you crave absolute anonymity, your best bet is to live in a cave and shun all human contact.

The same thing is true of the Internet. If you visit a website, the owner can, if he's sufficiently motivated, find out who you are. After all, the ones and zeroes that make up the Web session have to be able to find their way to the right place, and that place is your computer. There are a lot of measures you can take to disguise the bits, and the more of them you use, the more thoroughly the bits will be disguised. For instance, you could use network address translation to mask your actual IP address, subscribe to an anonymizing service that launders bits by relaying them from one end of the ether to the other, use a different ISP account for different purposes, surf certain sites only from public kiosks, and so on. All of these make it more difficult to determine who you are, but none of them make it impossible. Do you know for certain who operates the anonymizing service? Maybe it's the same person who owns the website you just visited! Or what about that innocuous website you visited yesterday, that offered to mail you a free $10 off coupon? Maybe the owner is willing to share information with other website owners. If so, the second website owner may be able to correlate the information from the two sites and determine who you are. And anonymity is even less achievable when you factor in location data, which is gathered perpetually by mobile phones and often enough by Web sites, mapping your machine’s IP address to a real-world location with pretty decent accuracy.

Does this mean that privacy is a lost cause? Not at all. Governments along with public and private entities continue to wrestle with how best to balance the need for personal data privacy with other concerns. What it means is that the best way for you to protect your privacy on the Internet is the same as the way you protect your privacy in normal life—through your behavior. Read the privacy statements on the websites you visit, and only do business with those whose data-sharing practices you understand and agree with. If sites you visit allow you to determine how and with whom information about you will be shared, learn how to adjust those settings and check yours regularly. If you're worried about cookies, disable them. Most importantly, remember that information shared by or about you online is only as safe as the least protective, least enforced privacy policies and settings with which it comes into contact. But if it's complete and total anonymity you want, better start looking for that cave.

If you need help with your network's security, please contact DNS today. (http://dynamicsupport.com/)

Source: http://technet.microsoft.com/en-us/library/hh278941.aspx