“How Clean Is Your PC?”

  • 0

“How Clean Is Your PC?”

Dear Blast Readers,


When it comes to your PC’s Cyber security do you do everything possible to prevent Cyber-attacks and data breaches? Do you use strong passwords? Do you know what constitutes a strong password? Do you avoid any suspicious emails that could lead you into a phishing attack? Do you use two-factor authentication on the accounts that allows you to do so? Have you ever wondered if that is enough? If that is really all it takes to secure your digital information?


When you hear the phrase “spring cleaning” you automatically think of cleaning your home. Doing the dishes, sorting cloths, and scrubbing every inch of your home. But, “Spring cleaning” can also refer to cleaning up and separating your digital junk from your valued digital information.


If you think that you do not have digital junk, you do. Whether it is old and forgotten email accounts, forgotten thumb-drives, or years’ worth of information in the download folder, everyone has digital junk


All unwanted and forgotten files are considered liabilities, a danger to you and your valuable digital information. In the event your digital devices are hacked, stolen, and/or lost, holding onto accounts and files you do not want and/or need opens you up to all kinds of risks. So, cleaning your digital devices is important when securing them.


So, where do you start your digital “spring cleaning”?

  1. Address your physical devices. Devices should be cleaned, destroyed, and disposed of properly. Only after you go through all the data and back-up what you want to keep.
  2. Go through your desktop and all your documents. It is important to go through and get rid of any old documents containing personal information, such as: medical and banking information.
  3. Delete any emails you don’t need or want. With your email being the data center of your online life, secure the emails you want to keep and delete the ones that you do not want.
  4. Cancel any account you no longer use. Before deleting any software, clean out and close the account. By doing so, this makes sure the company retains the smallest amount of information as possible about you. It also prevents any more information about you from being collected.
  5. Cancel any email account you no longer use.


If you have any questions about Data Security, Cyber Attacks, Cyber Security, or Computer Forensics contact FDS Global. You can reach us at our office at (954) 727-1957 or by email at RMoody@FDS.Global. Please feel free to visit our website at www.FDS.Global.

  • 0

“Year of the Hack!”


Dear Blast Readers,


From everyone here at FDS Global we would like to wish you a Happy New Year. But as the New Year begins we are in the most tumultuous point in history when it comes to Cyber Security. Many new threats that have arose at the end of 2016 and many more will arise in 2017. With claims of the United States Government being HACKED by foreign entities such as Russia and China companies and the lay person has much to fear, but as an old saying goes prepare for but pray for peace. With this saying in mind, the best strategy to counter possible attacks is to prepare your company with the best defenses.


Here are some helpful tips that will keep you ahead of the Cyber Criminals and their attacks.

1. Change, if there is one thing that both IT professionals and Cyber criminals have in common is that fact that they both do not like change (but for different reasons). IT professionals do not like change because they want to keep the systems and processes static to:

  • Make their lives easier and
  • To keep their work organized.
    • Cyber Attackers on the other hand thrive off static networks. This is because if these networks do not change than they can study them, learn all the ins and outs (using that knowledge to compromise your data.
    • If you want to make the life of a cyber-criminal difficult, create & environment that prospers with change (meaning move your data and change the networking design & changing passwords regularly).

2. Use Antivirus and Antimalware software. Antivirus and Antimalware software are critical to any company in the defense of Cyber-attacks. The most important key to using Antivirus and Antimalware software is regularly updating them, this help prevents from zero-day attacks. Zero-day attacks use viruses and malware recently created.

3. Monitor for irrelevant information usage. It is important to watch for activity that does not make sense for your company/organization. Cyber criminals do their homework before they attack a company/organization, meaning they know how to slip through the cracks. Spotting suspicious activity, like an employee who no longer works with the company doing something inside the network is an example of suspicious activity. Being vigilant can be help stop data breaches.

4. Back Up your IT Environment. Did you know that one of the leading causes of Data Loss is human error? To help prevent data loss back up your IT environment, so that if something happens you have a recovery point to start from. Having a recovery point will help mitigate the amount of information lost and decrease the amount of time until your company is back up and running.

5. Train your Employees in Cyber Security. Cyber Security education and training is important for employees to learn. It teaches them why it is important to watch for suspicious activity, as well as the importance of changing passwords. Teaching employees this will help you have a more vigilant work force.


If you have any questions on Strong Passwords, Good Antivirus and Antimalware software, what constitutes “irrelevant network usage”, the proper way to back up your IT Environment, or are interested in FDS Global’s Cyber Security Training and the CLE credits that coincide please contact us by phone at 954-727-1957, or contact us by email at rmoody@forensic-data-svc.com. Also, Visit our website at www.FDS.global. `