About tlgadmin

This author has not yet filled in any details.
So far tlgadmin has created 185 blog entries.

Do You Accept Credit Cards? If Yes, Read This….

VISA just released this Security Alert.  It affects everyone who uses a Point-of-Sale (POS) terminal to accept credit card payments.  If you use that small device by your register to slide cards in order to accept payment you may be at risk.

VISA has identified malicious code that can allow hackers to gain access to the credit card information you are receiving through these POS terminals.  Some of the service providers who maintain these devices are not following good security practices and

Do You Accept Credit Cards? If Yes, Read This….2019-07-16T21:17:59-07:00

Multimedia Just Got a New Life and a New Jump-Off-the-Page Twist

I love technology for its constant change and innovation.  Today I learned about a new technology that blends with traditional print to blow my mind.  I am sure it will do so for you, too.  That technology is called Print2life.  The technology let’s an advertiser create a traditional print ad for a magazine, newspaper, direct mail piece, door hanger, product label, etc.  But with Print2life technology you can hold your phone over the advertising image and scan the print advertisement.  After a couple of seconds the advertisement pops up on your...

Multimedia Just Got a New Life and a New Jump-Off-the-Page Twist2024-03-14T00:18:22-07:00

Did You Think the OPM Breach Could Be This Bad? I Didn’t

These are some serious allegations.  Read the whole story for the chilling insight and alleged incompetency.  Here are some choice quotes:

"From my perspective, OPM compromised this information more than three years ago," he added. "And my take on the current breach is 'so what's new?'"

In fact, the breach was unprecedented in its breadth and scope: "Security-wise, this may be the worst breach of personally identifying information ever,"

Did You Think the OPM Breach Could Be This Bad? I Didn’t2023-08-11T01:02:32-07:00

Oli’s Top Five Computing Threats for the Second Half of 2015

I was recently asked to be part of a webinar moderated by Elliott Markowitz, The VAR Guy.  Elliott wanted me to share my thoughts on the top threats facing small to mid-size businesses.  My answer is not scientifically derived, but based upon what I am seeing most often in the past two years of IT and security management in my world.  I am seeing the top threats from these five areas:

1.    Ransomware – Organized crime groups that encrypt all your important files and hold your data hostage until you pay....

Oli’s Top Five Computing Threats for the Second Half of 20152023-08-11T01:19:23-07:00

Password Tip and Weekly Tips on Smart Business Practices

David Berkus writes a very good weekly blog on “cutting edge business success tips.”  The series of blogs is called Berkonomics and it is worth your time to go there and register to receive the weekly e-mails.  Here is an example of his writing on the topic of “Switching Costs.”  You can sign-up HERE.  Dave’s series of blogs is also available in three Berkonomics books.

While I love reading Dave’s blogs and I am therefore sharing the information above, my main reason for writing this blog today is to share another piece of the endless wisdom that comes from Dave.  This week his blog e-mail started with this paragraph:

First, let me PLEAD with you to take care with your email and strengthen your email password. A clever hacker invaded....

Password Tip and Weekly Tips on Smart Business Practices2015-06-10T17:00:00-07:00

Purpose, Mastery and Autonomy in Managing IT Infrastructure

I love Daniel Pink’s writings.  I thought I would share this article from SmartCompany.com.  The message about Purpose, Mastery and Autonomy I reread from time to time.  The message is short, but it rings so true for me.  The most [...]

Purpose, Mastery and Autonomy in Managing IT Infrastructure2023-08-11T01:39:57-07:00

Alvaka’s Kevin McDonald Writes for CAPG on 15 Ways to Safeguard PHI

Alvaka Networks COO/CISO Kevin McDonald is a featured author in this month’s CAPG Health magazine.  He writes about the obligations under HIPAA and HITECH to protect health information and how failure to do so can cost $359 per record breached.  [...]

Alvaka’s Kevin McDonald Writes for CAPG on 15 Ways to Safeguard PHI2023-08-11T01:39:19-07:00

Beware – There is a New Ransomware Variant Running Loose

I just read on BleepingComputer.com a new post about a variation of the CoinVault ransomware.  This one is called BitCryptor and unless you have a good backup it sounds like you will be paying the ransom if you are hit.

Here are some key characteristics:

Beware – There is a New Ransomware Variant Running Loose2015-05-19T02:55:34-07:00