Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Technology companies come and go, but Bit by Bit backs its service with 30 years of experience helping businesses achieve their goals with reliable IT solutions and support. We were established in 1987 as a database application development and networking company, and since then we’ve evolved into a full-service IT firm and leader in delivering powerful and cost-effective technology solutions. visit our site at www.bitxbit.com
Friday, December 20, 2019
Thursday, December 19, 2019
We Couldn't Do This Without You
Dear Friends,River Legacy Living Science Center is a Nature Center surrounded by beautiful River Legacy Park where you can learn, explore, play, and escape. River Legacy Foundation needs your help to continue our mission.
By supporting River Legacy, you keep trails, bridges, creeks, walkways, and habitats along the Trinity River accessible and inviting. You provide the opportunity for thousands of urban children to have their FIRST WALK IN THE WOODS. Your help allows them to fall in love with nature!
Your support shows that you care for animals that live here.You partner with our Nature Center to create a rich, outdoor education experience that connects people to the environment and inspires them to protect the Earth.
Please support River Legacy Foundation. When you care about something, you nurture and protect it, now and for future generations.Thank you for supporting River Legacy.
Jill HillExecutive Director817.860.6752, ext. 108
Becky Nussbaum GerroDirector of Development817.860.6752, ext. 120
703 NW Green Oaks BoulevardArlington, TX 76006
Unsubscribe reblake@gmail.com Update Profile | About Constant Contact Sent by christine@riverlegacy.orgin collaboration with
Try email marketing for free today!
Wednesday, December 18, 2019
Important Security Update from Ring
The facts about
password security.You may have seen reports recently about our customers' Ring accounts. Rest assured, we've investigated these incidents and did not find any indication of an unauthorized intrusion or compromise of Ring's systems or network. However, even though Ring's systems were not compromised, we do want to share how these issues occurred, and some easy steps you can take to further protect your Ring account and other online accounts. Here's what happened. Malicious actors obtained some Ring users' account credentials (e.g., username and password) from a separate, external, non-Ring service and reused them to log into some Ring accounts.
When people reuse the same username and password on multiple services, it's possible for malicious actors to gain access to many accounts.
We've taken appropriate action to block these malicious actors and contacted all affected users directly.Here's what you can do now. Even if your credentials were not obtained by malicious actors, we strongly encourage everyone to enable Two-Factor Authentication and follow these password best practices. Enable Two-Factor Authentication. Turn on this enhanced security feature in the Ring app to receive a unique code via text message to your phone whenever you or someone else attempts to log into your Ring account and is asked for your Ring password. Many other online services offer Two-Factor Authentication as well, and we encourage you to turn this feature on wherever available in your other online accounts. Add Shared Users. Don't provide your login information to others. If you want to share access to your Ring devices with other people, simply add them as a Shared User. This allows you to maintain control of your account. And if you currently have Shared Users, please ask them to enable Two-Factor Authentication and follow the password best practices below. Learn More Use different passwords for each account. By using different usernames and passwords for your various accounts, you reduce the risk that a malicious actor could reuse credentials compromised from one account to access another of your accounts. Learn More Create strong passwords. When creating a password, use a mix of numbers, letters (both uppercase and lowercase), and symbols – embracing long, non-dictionary based words or phrases. Learn More Regularly update your passwords. It's good practice to update your passwords every 3-6 months. If it has been more than 6 months since you last updated, we recommend updating it now. Learn More As a neighbor of Ring, your safety is our highest priority. We're committed to helping you keep your home safe and protected – and that means keeping you informed with best practices for your online security, too.
If you have questions or need assistance turning on Two-Factor Authentication or changing your password, please contact help@ring.com.
Wishing you a safe and happy holiday,
The Ring Team
©2019 Ring LLC or its affiliates.
1523 26th Street, Santa Monica, CA 90404.Ring and all related logos are trademarks of
Ring LLC or its affiliates.
New Threat Actor Impersonates Government Agencies
Cybersecurity researchers are warning consumers of a new threat actor impersonating government email accounts in the US and EU. To date, researchers have discovered hoax emails from the US Postal Service, the German Federal Ministry of Finance, and the Italian Revenue Agency. The emails are delivering malicious payloads containing ransomware to a variety of recipients.
While researchers found that cybercriminals are targeting a broad audience with their messages, they concluded that most are heavily skewed toward businesses, which offer higher payouts and more robust data sets when attacks are successful.
Fortunately, malicious emails rely on user response, so businesses can protect themselves by training their employees to spot fraudulent emails. This particular attack might be new, but the strategy is well-established, and today’s employees need to be aware of the threats that are potentially lurking in their inboxes.
https://www.bleepingcomputer.com/news/security/new-threat-actor-impersonates-govt-agencies-to-deliver-malware/
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Tuesday, December 17, 2019
Less than 30 days till Windows 7 is no longer supported.
On January 15th Microsoft will be ending support for Windows 7. This does not mean that your computer will stop working, however, you will get a popup warning from Microsoft... What is does mean is that Microsoft will no longer be providing patches, this can leave your network and data vulnerable to compromise..
You do have options, and depending on the age of the actual PC hardware, you may be able to simply run an upgrade on the operating system software. This is also a good time to look at upgrading your hardware that would include an upgrade to Windows 10.
If you need help or want more information on what this means please call me at 817.505.1257 or schedule a time with me at https://calendly.com/robertblake/30min
I will be happy to discuss your options for upgrading your windows or any other computer needs you may have.
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Data Breaches Reach New Highs
2019 has been a notorious year for data breaches, a reality that is playing out in front page headlines and major industry studies. According to Risk Based Security’s Q3 2019 Data Breach Report, it’s the worst ever recorded in history.
The year’s third quarter saw a year-over-year increase of 112% in the total records exposed. Unfortunately, this isn’t all attributable to the high-volume data breaches at major corporations. This year, SMBs, government agencies, and educational institutions are also seeing an uptick in cybersecurity incidents, together creating a 33.3% increase in the total number of breaches for the year.
Notably, many of these data breaches were avoidable. From misconfigured databases to phishing attacks, businesses have many options at their disposal for proactively protecting their most sensitive information. There is no indication that this recent data breach trend is likely to abate anytime soon, so businesses of every size have plenty of reasons to ensure that negligence isn’t the cause of yet another data catastrophe.
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com
Subscribe to:
Posts (Atom)
-
Windows 10 End-of-Life: Why You Must Upgrade Now to Stay Secure and Compliant Microsoft has officially announced the end of support for Win...
-
What is SOC-as-a-Service? By Robert Blake Having a Security Operations Center (SOC) in-house is expensive for the average business. Large ...
-
In today’s digital-first world, non-profit organizations are under increasing pressure to secure sensitive data, streamline operations, and ...











