We’ll secure your data. All of it.

  • 1 800 778 9969
  • 286 E. Hamilton Avenue, Campbell CA 95008
  • sales@trutechnical.com

Blog / Home / Blog

Did You Know Your Phone Can Recognize Your Face?

The future of identifying and authenticating may be in your face. Here’s how it works and why it’s hard to fool the computer. That said, what happens when hackers do figure out ways to fool authentication machines based on facial recognition? You can’t change your face in the same way you change your password. https://lnkd.in/g3GYwzH

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Did You Know Passwords Don’t Keep Your Data Safe?

We all use passwords, however, they’re not the best security. And in the future I expect to see passwords replaced. We’re already seeing cloud providers and enterprise companies moving to something called “Dual Authentication”…this simply means, having something and knowing something…the simplest way to do this seems to be getting a text to your phone (Something you have to have on you at the moment) – a one time password you know, which lasts for just a few minutes…This articles explains where passwords came from and why they don’t work.

https://www.computerweekly.com/opinion/Security-Think-Tank-Passwords-alone-are-not-good-enough

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

We All Know What Ransomware is Now – What About Cryptojacking?

If you don’t know what this is, it’s important – cryptocurrency mining malware is what hackers use to steal (mine) cryptocurrencies like Bitcoin.

Why is this important? Because these unsuspecting thieves need lots of computing power to mine these digital dollars, and they’re using your computer to do it. At least two problems result – one, your computer is involved in stealing and you might be held accountable if you can’t prove it’s not you doing it. Second, it will take your computer’s performance from good to its knees in no time.

Next time you hear someone say, my computer’s slow today – pause to consider if you really want them working on your stuff.

https://www.databreachtoday.com/cryptojacking-displaces-ransomware-as-top-malware-threat-a-11165

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Data is a Currency – Your Data Is Important. Do You Know What Others Are Doing With it?

Here’s a great breakdown on what many big software companies are doing with your data – to track you, make money off you, and learn more about you (for many reasons including marketing). We’re all using the cloud – however, that doesn’t mean your security and privacy concern have disappeared. In fact, cloud demands a closer look at who has your data and what they plan to do with it.

https://flipboard.com/@flipboard/-what-tech-giants-really-do-with-your-da/f-d3db706e0b%2Fco.uk

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

How Do Hackers Get In?

Knowing how hacker operate can help you put in the right security strategies, policies, and training to keep you and your team (and all your data) safe! I like this article because it’s not super technical. Find out in simple terms what’s going on – the stuff you can’t see, but really want to stop.

https://www.arnnet.com.au/article/643411/motivations-malware-inside-mind-hacker/?eid=-100

P.S. Have you seen my free livecast with CISSP and security expert David Stelzl? Watch it here and find out the one big mistake that most small business leaders are making. https://troe.clickfunnels.com/stelzl-business-strategy-webinar

Are you ready to limit your Cyber business risk?

Click the button below to get started!

Get Started