top of page
Search
#1 thing to lock down in 2026: your identity.
🔒 2026 Cybersecurity Wake-Up Call: Identity is the new battleground — and passkeys are your best weapon Hey everyone, with AI getting freakishly good at faking voices, faces, and even full video calls, your identity is hands-down the #1 thing hackers are targeting in 2026. One stolen login or tricked employee and boom — they can move at machine speed inside your systems. The big consensus from security pros this year? Lock identity down ruthlessly before it's too late. Her

Ken
Dec 30, 20252 min read
More is more...
When it comes to security, more password complexity, more levels of authentication and more secure approaches improve your computer and network security. Two-factor authentication (2FA) matters because passwords alone are no longer enough. Even strong, unique passwords can be stolen through: phishing, keyloggers, data breaches, credential stuffing. When 2FA is enabled, an attacker who knows your password still can’t log in without the second factor (usually your phone, hardwa

Ken
Dec 1, 20252 min read


Been juice jacked lately?
Charging your iPhone or Android phone at a public charger can be dangerous mainly because of “juice jacking” and other security risks. Juice jacking exploits the dual nature of USB ports, which can transfer both power and data . When you plug your phone into a public charging station —like those in airports, hotels, or cafes—an attacker could have modified the port or cable to initiate a data connection. Here are some of the things that can happen: JUICE JACKING (data theft

Ken
Nov 3, 20252 min read


Who's hunting you?
If your business uses computers, and whose doesn’t, you’re under attack. I don’t mean the “click here to change your password” you see...

Ken
Apr 22, 20222 min read


Give me your wallet or your life-time of memories
Our new office: no commute, nor dress code and the cheapest coffee in town, but some of our normal business safety nets may be missing.

Ken
May 25, 20203 min read


Working from home...STILL?
Working from home...STILL?
The three things that make working from home work for me:
(1) good tools
(2) dedicated space
(3) no apologies

Ken
May 8, 20204 min read


The right tool for the job
Most of us depend on having the right tools for the job. A mechanic, a carpenter, even a surgeon need specialized tools to ensure they...
Ken Kleiner
Jul 18, 20172 min read


Petya malware learns some new tricks: thanks WannaCry!
There is a new villain on the prowl: the newly improved ransomware Petya, or PetyaWrap as it often referred to. Very much like the latest...
Ken Kleiner
Jun 29, 20172 min read


5 ways to stop being phish food
Phishing (pronounced 'fishing') is where criminals attempt to steal our personal data - most often passwords and credit card information....
Ken Kleiner
Jun 12, 20174 min read


Apple: what was old is new again!
Apple events have always had a bit of a carnival atmosphere: music, grand statements and often has something you want to take home with...
Ken Kleiner
Jun 7, 20173 min read


Internet of EVERYthing? Where did the internet of things go?
Firstly, what do these terms mean to the average person like us? The internet of things (IoT) are physical devices and objects that are...
Ken Kleiner
May 29, 20172 min read


4 steps to make your router the bad guy
I wear many hats when it comes to networking: helicopter father, policy enforcer, hallway monitor and many others. I could dedicate many...
Ken Kleiner
May 26, 20173 min read


Wanna Cry? Wave 2 is coming, and 3, 4...
In one of the more aptly named malware attacks, WannaCry has become one of the fast spreading infections yet. With hundreds of thousands...
Ken Kleiner
May 15, 20172 min read
bottom of page