Education - Hungerford Technologies

Blog

These Password Recommendations Might Surprise You

It’s time for a pop quiz. Is the following statement true or false? It is best for businesses to require that employees create long, random passwords that include mixed-case letters, numbers, and symbols. For a long time, the prevailing belief was that this statement was true, so many companies included composition rules in their password […]

How to Troubleshoot Google Service Outages

Like in a power outage, when Gmail or another Google service suddenly stops working, your first thought is likely “Is it just me or is the whole system down?” Unlike a power outage, you cannot simply look out your window to see whether neighboring buildings are experiencing a Google service outage. You can, however, check […]

Fake Ad Blockers Were Downloaded by 20 Million Chrome Users

Extensions are popular among users of Google Chrome, Microsoft Edge, and other web browsers. These programs, which are often free, let users personalize and add new features to their browsers. However, extensions are also popular among cybercriminals. They offer free ones that are laced with malicious code, including but not limited to fake ad blockers. […]

5 Ways the Windows 10 April 2018 Update Can Help You Be More Productive

On April 30, Microsoft officially released the Windows 10 April 2018 Update (formerly known as the Spring Creators Update). It is the first of two major updates expected in 2018. Microsoft will start rolling it out through the automatic update feature in Windows Update on May 8. Microsoft also offers a way to manually initiate the download […]

How to Protect Your Business from Credential Stuffing Attacks

Around 5 billion stolen credentials are up for grabs, according to security researchers who monitor the dark web. These credentials, many of which come from data breaches, are exploited by numerous cybercriminals. Cybercriminals know that many people reuse their passwords, so they use the stolen usernames and passwords in credential stuffing attacks. In this type of attack, […]

8 Policies to Protect Your Business’s IT Assets

Writing IT policies is not exactly fun, but it is important. They help ensure that a company’s IT resources are used appropriately and productively. Besides documenting requirements and expectations, IT policies often discuss the consequences of policy violations. There are many different types of IT policies. For example, some IT policies document what must be […]

HP and Fujitsu Recalling Lithium-Ion Batteries Due to Fire Hazard

Both HP and Fujitsu are recalling the lithium-ion batteries used in some of their mobile devices. The batteries are overheating, causing a fire hazard. HP Recall HP is voluntarily recalling the lithium-ion batteries used in some of its HP notebooks and mobile workstations. Problems with the batteries came to light after 8 people reported battery […]

Business Email Scams Are on the Rise

Business Email Compromise (BEC) attacks — sophisticated email scams designed to con companies out of money and sensitive data — are on the rise. Researchers at both Agari and IBM have seen notable increases in the number of BEC attacks. This is not too surprising given that cybercriminals like to use this type of attack because it is very […]

How to Stop a Gmail Email from Being Delivered Even Though You Clicked the “Send” Button

If you regularly send emails, you probably have clicked the “Send” button and then realized you shouldn’t have. Perhaps you forgot to attach a file or realized that you misspelled someone’s name. If you have Google Gmail, you can rest easy knowing that you can stop the email from being sent with a single click. […]

Wiggle a Window to Declutter Your Desktop

If you have many applications and files open and stacked on top of each other when working on your computer, you are not alone. It is a common sight on computers in businesses worldwide. This clutter can make it hard to access the desktop or concentrate on the task at hand. To declutter your desktop, […]