We’ll secure your data. All of it.

  • 1 800 778 9969
  • 286 E. Hamilton Avenue, Campbell CA 95008
  • sales@trutechnical.com

You Need A Password Manager…

Writing them down isn’t working…

The age of digitalization is here, and that means everything is in the cloud. While some things are suddenly more convenient, another administrative nightmare has been born. Too many passwords! And now the experts are telling you you need lower case, upper case, special characters, and at least 8 characters!!!

The truth is, you really do need something better than your dog’s name followed by a number. It’s computers that try to guess your password, not some guy locked in a dark room. And computers can process permutations of numbers fast!

The solution? Well, the best solution is two factor authentication. However, that may not be available where you work or on all the cloud services you use.  The next best thing is a password manager…or password vault.

Take a minute today and Google “password manager”.  There are lots of great options. Some sync to your phone or across all of your devices. Password managers can store lots of information including driver’s license numbers, social security numbers for your family, and the thousands of passwords you carry in a notebook (or are you one of those who uses the same password for everything – which is a really bad idea).  Download one and start using it. A good one will allow you to easily generate new (complex) passwords in a moment, as well as storing links to the sites you use, and auto-filling them. The best part is, these programs encrypt your data so it’s a whole lot safer than writing them down or reusing them.

P.S. The first step is understanding your company’s risk – if you don’t have my pdf, 8 Ways Employees Enable Hackers, this may help you identify points of vulnerability within your business – download it here: https://lnkd.in/ecBTk-R

App Traps – Think Before You Download!

This article was published in The Wall Street Journal – which you may not have access to (without a subscription), however the topic is important, and we are keeping an eye on this for you right here! App Traps: How Cheap Smartphones Help Themselves to User Data.

In this report, the author uncovers an interesting trend with burner phones – which may come with preloaded apps – written by who knows who. Lots of people use these for privacy,  travel, etc. However, today’s phones have the ability to listen to you, track you, and watch you! It’s only our trust in the vendor controlling that apps that gives us a sense of security…and when that disappears, there’s no telling what your phone is doing!   

My recommendation? Stick to known carriers, know brands, and make sure you phone security is set up properly – including malware protection (especially on Android).

P.S. The first step is understanding your company’s risk – if you don’t have my pdf, 8 Ways Employees Enable Hackers, this may help you identify points of vulnerability within your business – download it here: https://lnkd.in/ecBTk-R

 

These New Cyber Attacks Have the Power to Destroy You…

Are you ready?

They’re called Gen V (generation 5) attacks…multi-vector, meaning they come in from different places all at once…including your cloud vendors! Mobile phones, wireless, home computers…simple firewalls and passwords don’t stop this sort of thing. However there are some things you can be doing. Most attacks take some time – so having a detection / response security program in place, much like monitoring the alarm you might use in your home with a service like ADT. When the hacker starts – detection alerts you, giving you (or your favorite 3rd party security monitoring company) warning to block their attempts. This is the new world we live in…

Read More About it Here…

P.S. The first step is understanding your company’s risk – if you don’t have my pdf, 8 Ways Employees Enable Hackers, this may help you identify points of vulnerability within your business – download it here: https://troe.clickfunnels.com/8waysemployeesenablehackers

The 10 Biggest Computer Hacks – Disasters We Can Learn From

Hacker History we should all know – safeguarding data has a lot to do with learning from those who have been hit in the past and not repeating their mistakes.  Every hack I can think of involves at least one mistake made by company leadership or their end-users (not well educated on safe data handling practices)… 

P.S. The first step is understanding your company’s risk – if you don’t have my pdf, 8 Ways Employees Enable Hackers, this may help you identify points of vulnerability within your business – download it here: https://lnkd.in/gSiA9VA

5-Minute Phone Break-In

When she fires up the “baby crying soundtrack” you know it’s GAME OVER! Social engineers are smart – often doing things you’d never be able to predict or prepare for.

P.S. The first step is understanding your company’s risk – if you don’t have my pdf, 8 Ways Employees Enable Hackers, this may help you identify points of vulnerability within your business – download it here: https://lnkd.in/ecBTk-R

Watch This Guy Break in…in Only 5 Minutes!

How long does it take someone to take over your computers? Watch this guy gain access with a simple email, URL, and phone call to tech support. Notice, firewall technology is not involved in this attack…no coding, no drawn out planning, just a simple call to ask someone to click a link – check this out:

P.S. Remember – the first step is understanding your company’s risk – if you don’t have my pdf, 8 Ways Employees Enable Hackers, this may help you identify points of vulnerability within your business – download it here: https://lnkd.in/ecBTk-R

If Yahoo! Can Get Hacked…

Vigilance in the face of an ever increasing cyber threat is essential these days. However, it easy to get complacent. Just take a look at Yahoo!  In this New York Times article the authors go into great depth the difference between a hyper-vigilant mentality like Google maintains and the more complacent one that allowed 500 million accounts to be compromised. That’s 500,000,000. That’s a lot of passwords out in the wild.

Of course who has the time for this sort of thing?

The Panama Papers

As you have probably heard the Panama Papers were one of the most damaging hacking incidents for the clients of a law firm to date. The list of activities that were uncovered from tax evasion and tax avoidance to money laundering was staggering. In addition the range of public figures (read: CLIENTS) who were effected was equally incredible. The release of these private files brought down the Icelandic prime minister, and forced Britain’s prime minister at the time, David Cameron, to explain himself publicly. The prominence of Putin associates in the Panama Papers confirmed many things that were always suspected of Putin. China, also had its share of prominent people represented and damaged by this hack.

You have to ask yourself, what would happen if your client’s files were hacked? Would they be your clients the next day? Would you still have a business?

The Panama Papers Leak

 

Security Blogs

If you have an interest in taking a deeper dive into the world of cybersecurity we have collected a number of the best blog “roundups” for you to explore. Enjoy!

https://heimdalsecurity.com/blog/best-internet-security-blogs/
https://digitalguardian.com/blog/top-50-infosec-blogs-you-should-be-reading
https://heimdalsecurity.com/blog/best-internet-security-blogs/
http://www.gfi.com/blog/the-best-35-information-security-blogs-to-follow/
https://www.checkmarx.com/2015/05/21/2015052129-cyber-security-blogs-you-should-be-reading/
http://www.rasmussen.edu/degrees/technology/blog/top-cyber-security-blogs/
http://www.securityinnovationeurope.com/blog/40-information-security-blogs-you-should-be-reading

 

You Need A Password Manager…

Writing them down isn’t working…

The age of digitalization is here, and that means everything is in the cloud. While some things are suddenly more convenient, another administrative nightmare has been born. Too many passwords! And now the experts are telling you you need lower case, upper case, special characters, and at least 8 characters!!!

The truth is, you really do need something better than your dog’s name followed by a number. It’s computers that try to guess your password, not some guy locked in a dark room. And computers can process permutations of numbers fast!

The solution? Well, the best solution is two factor authentication. However, that may not be available where you work or on all the cloud services you use.  The next best thing is a password manager…or password vault.

Take a minute today and Google “password manager”.  There are lots of great options. Some sync to your phone or across all of your devices. Password managers can store lots of information including driver’s license numbers, social security numbers for your family, and the thousands of passwords you carry in a notebook (or are you one of those who uses the same password for everything – which is a really bad idea).  Download one and start using it. A good one will allow you to easily generate new (complex) passwords in a moment, as well as storing links to the sites you use, and auto-filling them. The best part is, these programs encrypt your data so it’s a whole lot safer than writing them down or reusing them.

P.S. The first step is understanding your company’s risk – if you don’t have my pdf, 8 Ways Employees Enable Hackers, this may help you identify points of vulnerability within your business – download it here: https://lnkd.in/ecBTk-R

App Traps – Think Before You Download!

This article was published in The Wall Street Journal – which you may not have access to (without a subscription), however the topic is important, and we are keeping an eye on this for you right here! App Traps: How Cheap Smartphones Help Themselves to User Data.

In this report, the author uncovers an interesting trend with burner phones – which may come with preloaded apps – written by who knows who. Lots of people use these for privacy,  travel, etc. However, today’s phones have the ability to listen to you, track you, and watch you! It’s only our trust in the vendor controlling that apps that gives us a sense of security…and when that disappears, there’s no telling what your phone is doing!   

My recommendation? Stick to known carriers, know brands, and make sure you phone security is set up properly – including malware protection (especially on Android).

P.S. The first step is understanding your company’s risk – if you don’t have my pdf, 8 Ways Employees Enable Hackers, this may help you identify points of vulnerability within your business – download it here: https://lnkd.in/ecBTk-R

 

These New Cyber Attacks Have the Power to Destroy You…

Are you ready?

They’re called Gen V (generation 5) attacks…multi-vector, meaning they come in from different places all at once…including your cloud vendors! Mobile phones, wireless, home computers…simple firewalls and passwords don’t stop this sort of thing. However there are some things you can be doing. Most attacks take some time – so having a detection / response security program in place, much like monitoring the alarm you might use in your home with a service like ADT. When the hacker starts – detection alerts you, giving you (or your favorite 3rd party security monitoring company) warning to block their attempts. This is the new world we live in…

Read More About it Here…

P.S. The first step is understanding your company’s risk – if you don’t have my pdf, 8 Ways Employees Enable Hackers, this may help you identify points of vulnerability within your business – download it here: https://troe.clickfunnels.com/8waysemployeesenablehackers

The 10 Biggest Computer Hacks – Disasters We Can Learn From

Hacker History we should all know – safeguarding data has a lot to do with learning from those who have been hit in the past and not repeating their mistakes.  Every hack I can think of involves at least one mistake made by company leadership or their end-users (not well educated on safe data handling practices)… 

P.S. The first step is understanding your company’s risk – if you don’t have my pdf, 8 Ways Employees Enable Hackers, this may help you identify points of vulnerability within your business – download it here: https://lnkd.in/gSiA9VA

5-Minute Phone Break-In

When she fires up the “baby crying soundtrack” you know it’s GAME OVER! Social engineers are smart – often doing things you’d never be able to predict or prepare for.

P.S. The first step is understanding your company’s risk – if you don’t have my pdf, 8 Ways Employees Enable Hackers, this may help you identify points of vulnerability within your business – download it here: https://lnkd.in/ecBTk-R

Watch This Guy Break in…in Only 5 Minutes!

How long does it take someone to take over your computers? Watch this guy gain access with a simple email, URL, and phone call to tech support. Notice, firewall technology is not involved in this attack…no coding, no drawn out planning, just a simple call to ask someone to click a link – check this out:

P.S. Remember – the first step is understanding your company’s risk – if you don’t have my pdf, 8 Ways Employees Enable Hackers, this may help you identify points of vulnerability within your business – download it here: https://lnkd.in/ecBTk-R

If Yahoo! Can Get Hacked…

Vigilance in the face of an ever increasing cyber threat is essential these days. However, it easy to get complacent. Just take a look at Yahoo!  In this New York Times article the authors go into great depth the difference between a hyper-vigilant mentality like Google maintains and the more complacent one that allowed 500 million accounts to be compromised. That’s 500,000,000. That’s a lot of passwords out in the wild.

Of course who has the time for this sort of thing?

The Panama Papers

As you have probably heard the Panama Papers were one of the most damaging hacking incidents for the clients of a law firm to date. The list of activities that were uncovered from tax evasion and tax avoidance to money laundering was staggering. In addition the range of public figures (read: CLIENTS) who were effected was equally incredible. The release of these private files brought down the Icelandic prime minister, and forced Britain’s prime minister at the time, David Cameron, to explain himself publicly. The prominence of Putin associates in the Panama Papers confirmed many things that were always suspected of Putin. China, also had its share of prominent people represented and damaged by this hack.

You have to ask yourself, what would happen if your client’s files were hacked? Would they be your clients the next day? Would you still have a business?

The Panama Papers Leak

 

Security Blogs

If you have an interest in taking a deeper dive into the world of cybersecurity we have collected a number of the best blog “roundups” for you to explore. Enjoy!

https://heimdalsecurity.com/blog/best-internet-security-blogs/
https://digitalguardian.com/blog/top-50-infosec-blogs-you-should-be-reading
https://heimdalsecurity.com/blog/best-internet-security-blogs/
http://www.gfi.com/blog/the-best-35-information-security-blogs-to-follow/
https://www.checkmarx.com/2015/05/21/2015052129-cyber-security-blogs-you-should-be-reading/
http://www.rasmussen.edu/degrees/technology/blog/top-cyber-security-blogs/
http://www.securityinnovationeurope.com/blog/40-information-security-blogs-you-should-be-reading

 

Are you ready for your FREE Evaluation of Your security?

Click the button below to get started!

Get Started