Phishing – part 2

Last time we looked at the reasons one needs to distrust all email. Here we continue with two more methods you can use to make sure you don't get phished. Digging deeper Email servers use standardized ways to relay and deliver mail. Every time a server acts on a message, it adds a header to the message describing what it…

Comments Off on Phishing – part 2

Looks Legit–How To Not Get Phished

An accountant in a small business office receives an email from her boss: "Please purchase (locally) some gift cards, scratch off the numbers, photocopy and send them to me by email. They are for giving to a person in need. I need this done immediately." Everything looks believable including the salutation and the signature. But the request is unusual. The…

Comments Off on Looks Legit–How To Not Get Phished

Who wants one more password?

Passwords, ugh! Who wants one more password to remember? Passwords are probably the best example of the tug-of-war between security and convenience. "You need long, complicated passwords!" "No, I need passwords that are easy to remember and quick to type!" Good Passwords ...are just one layer in what should be a defense-in-depth. But bad passwords are, well, a wide open…

Comments Off on Who wants one more password?